Zeroska
  • ๐ŸฑZeroska - The Bold
  • Computer/Cyber Security
    • โญFresh off the boat - for new Blue Teamer/ SOC Analyst
    • ๐Ÿ’€Necromancer (DFIR)
      • ๐Ÿ•ต๏ธDFIR and DFIR case
        • ๐Ÿ—ƒ๏ธCase Files
          • Misconfiguration 0x01
      • ๐Ÿ“”My own DFIR notes
        • The Mark of The Web (MOTW)
        • LNK Shortcut
        • Prefetch, AmCache, ShimCache in Windows
        • Malicious Document (VBA, Office, PDF, ...)
        • SRUM (System Resource Usage Monitor)
        • Volatility notes
        • Understand Logon Session in Windows
        • "Very" Hidden sheets in Excel
        • Hidden Processes
      • ๐Ÿ“”Notes
        • Useful Resources
        • Useful Resources DFIR
        • Saved Content (Backup for the OG content get deleted)
          • How to be best SOC analyst ever
    • ๐Ÿง™โ€โ™‚๏ธDefense Witchcraft
      • Data Analysis as a Defender
      • Active Directory
      • Windows Event Logs
        • Authentication (Windows Account Life Cycle Events)
      • MS Exchange
      • Windows
    • ๐Ÿ’™My Current Blue Team Operation
      • VLAN Monitoring Template
      • Daily Monitoring Report
      • General Playbook
      • JupyterHub Configuration Guide
      • How to train your Blue Team
    • ๐ŸญICS/OT
      • Setup ICS/OT Simulation Learning Lab
      • Smart Grids
      • Learning Modbus TCP
      • Learning DNP3
      • Resources/Blogs/Links
    • ๐ŸฅทThreat Intelligence
      • Small Cyber Threat Intelligence Program
      • Intelligence Analysis [VN]
      • OSINT Information Monitoring
        • Telegram Info-Stealer Monitoring
      • C2 Tracker
      • Fake Website Tracker
      • Dark Web Investigation Attempt
      • Threat Intelligence Quick Win
      • Resources/Blogs/Links
  • ๐Ÿ˜’Computer and Technology
    • My Home Lab Setup
    • ๐ŸดELK Stack
      • Useful Resources
      • ELK Stack - Container - Docker Compose - AWS ECS
      • ECS - Elastic Common Schema
      • Elasticsearch
      • Logstash
      • Troubleshooting and Problems
    • ๐ŸงLinux
      • Setting up good SSH Authentication
      • Configure Auditd and how to leverage it
      • ELF Format
      • Useful Links
    • ๐Ÿ“ฆContainers
      • Docker container logs is quite big
      • Worth Reading
    • ๐Ÿช Splunk Learning Experience
      • Splunk Test Lab
      • Data Collection Tier (How to get the data)
      • SC4S Custom Filter For Windows Event Log in Syslog Format (NXLog)
      • Useful Resources
  • Threat Hunting
    • Hunting for Implant
    • Using STRIDE and DREAD
    • ๐ŸณPredators and Preys (Computing)
      • Tracks or Hunting Artifacts
    • ๐Ÿ“ฆNetwork Packet Analysis
      • The Basic
      • Tshark | Zeek Copy & Paste
      • Network Analysis Resources
    • Grep | Powershell Search | Regex
    • Hunting Resources
  • ๐ŸŽตIn my remains
    • Choices
    • The Art of Facing Unknown Problems
    • Build the best DFIR team
    • Reverse Engineering - ฤแป“ รกn hฦฐแป›ng ngร nh A "Hแปฅt" cแปงa tรดi
Powered by GitBook
On this page

Was this helpful?

  1. ๐Ÿ˜’Computer and Technology

๐Ÿช Splunk Learning Experience

Splunk Test LabData Collection Tier (How to get the data)SC4S Custom Filter For Windows Event Log in Syslog Format (NXLog)Useful Resources
PreviousWorth ReadingNextSplunk Test Lab

Last updated 1 year ago

Was this helpful?