Posts

Splunk | Log Analysis | Adding Data | Searching / Querying | Incident Investigation | Dashboards & Reports | TryHackMe's Room Tasks

Image
Splunk is one of the leading SIEM solutions in the market that provides the ability to collect, analyze and correlate the network and machine logs in real-time. It helps aggregate data from different data sources in the enterprise environment to help enhance security monitoring. Overview: In this project I will share how I used and learned Splunk during TryHackMe''s SOC L1 learning path. TryHackMe is a platform that provides hands-on Cybersecurity challenges and labs for learning and practicing various hacking and security-related skills. It's a legal and ethical platform designed for educational purposes, allowing users to develop their skills in a controlled environment. There were different rooms in which I performed many tasks utilizing Splunk such as how to ingest logs, analyze logs, querying data, how to perform investigation and creating dashboards Terminologies Used: Splunk Forwarder:  Splunk Forwarder is a lightweight agent installed on the endpoint intended to b

A Comprehensive Report on Emerging Phishing Exploitation Techniques, Exploration and Mitigation Strategies | Internship Task

Image
Overview: This was an individual task assigned in our internship at Senselearner Technologies Pvt. Ltd., where each intern had to choose a category related to exploitation and create a comprehensive report on it. I chose phishing as my category and prepared a report on it. This comprehensive report covers Phishing Exploitation, Exploration & Mitigation Strategies. Title: Report on Emerging Exploitation Techniques, Exploration and Mitigation Strategies  Dated: 17th Oct, 2023  Prepared by: Hummab Rabbia  Position: Cybersecurity Intern  Chosen Category: “Phishing”  Table of Contents  Phase 1 Exploitation Techniques  Identification Technique Analysis Vulnerabilities Targeted Real-World Examples Phase 2 Exploration and Mitigation Strategies  Mitigation Techniques Countermeasures Emerging Solutions References Phase 1: Research on Exploitation Techniques  Identification  Definition:  Phishing is the practice of sending fraudulent communications that appear to come from a legitimate

OSINT Report on senselearner.com | Internship Task

Image
OSINT:   OSINT stands for Open Source Intelligence, and it refers to the process of collecting and analyzing information that is publicly available from open sources. Open sources include a wide range of publicly accessible information, such as websites, social media platforms, news articles, government reports, academic publications, and more. Overview: This was the task assigned to each internee during our internship at Senselearner Technologies Pvt. Ltd. to conduct an Open Source Intelligence on the company's website. The purpose of this report was to conduct information gathering and reconnaissance activities on the website senselearner.com in a legal and ethical manner. The primary objective of these activities was to assess the security and analyze the associated risks. This report will serves as a crucial starting point for further security analysis and risk assessment. Based on these findings, recommendations made to enhance the website's security and mitigate poten