Detecting RDP Brute Force Attacks with Elastic: A Step-by-Step GuideIn this blog, I will discuss how to create rules in Elastic to detect RDP brute force attacks. We’ll explore two methods: creating…Dec 15, 2024Dec 15, 2024
Connect Two Home-labs with OpenVPN and make it accessible across the internet.My friend Hemanth (Check out his blogs here!) and I decided to connect our home-labs . Here is how you can do it too!Dec 10, 20241Dec 10, 20241
Firewalls 101 — A comprehensive introduction to concept of firewalls and UFW (Uncomplicated…What are firewalls?Jul 20, 2024Jul 20, 2024
What made July 19th the International blue screen day — Windows & Crowdstrike global outage…Imagine this: You’re at the airport, ready to check in for your flight, when suddenly, the system crashes. Panic sets in as you witness…Jul 19, 2024Jul 19, 2024
Introduction to Pivoting using Metasploit Framework with lab setupIn this blog, I will go through the simple method of pivoting from one victim to another using Metasploit. I have created a lab setup to…Jul 17, 20231Jul 17, 20231
Ditching Netflix and creating my own OTT: Turning my old laptop into a powerful Linux server.Do you have an old laptop gathering dust in a corner, seemingly useless and outdated? Don’t let it go to waste! In this blog I’ll walk you…Jun 15, 20232Jun 15, 20232
How to Rickroll your friends with a Poor man’s USB Rubber Ducky?I was going through my old stuff and found an old CD which had a simple flash game in it. I opened it up on my laptop and found a file…Jun 6, 2022Jun 6, 2022