Nikhil ChaudhariPhishing Email Analysis ManuallyHere in we are going to cover how we can collect artifacts that help us to indentify the malicious threat in corporate environment.Nov 7Nov 7
Nikhil ChaudhariSplunk SOAR(Phantom) Installation and ConfigurationThis blog covers what is soar? how can we install it, and how we can configure it to play automation of threat response.Nov 7Nov 7
Nikhil ChaudhariYARA setup : installation and configuration of YARA in linux machineHere i will cover installation and configuration of YARA in linux machine. also see how we can create rules for malware or threat detectionNov 7Nov 7
Nikhil ChaudhariMalware Detection with YARA: A Guide to Threat Identification and ResponseHere we will see overview of YARA rules and study the features of yara provides. also study the structure of rules, how can we create…Nov 7Nov 7
Nikhil ChaudhariHow to eradicate Malware during incident responseHere we cover practical scenario of incident response in corporate environment. Here I will try to show how the…Nov 6Nov 6
Nikhil ChaudhariTop 50 Powershell commands for security analyst : Part 2Here I will cover other 25 remaining Powershell commands which we couldn’t cover in last blog due to long content.Nov 4Nov 4
Nikhil ChaudhariTop 50 Powershell commands for security analyst : Part 1In this blog I will cover top 50 commands of powershell which are used by security analyst in day to day tasks.Nov 3Nov 3
Nikhil ChaudhariPowershell Basics : Part 2In this blog we will cover what is powershell ? what are types of it ?, and why we use it and where we use it ?Nov 2Nov 2
Nikhil ChaudhariUnderstanding Incident Response with NIST framework : Part 1This blog is all about what is incident response and how we deal with incidents occurs in corporate.Nov 1Nov 1
Nikhil ChaudhariSuricata : Creating Rules with practical scenariosIn this blog we will cover two exercise 1st is Network based attacks and 2nd is Web based attacks. both of them are discussed in the blog.Oct 28Oct 28