Incident Journal: Events & Experiences
A structured log of security investigations, tool exercises, and incident response practice mapped to the NIST IR Lifecycle.
A structured log of security investigations, tool exercises, and incident response practice mapped to the NIST IR Lifecycle.
A practical walkthrough of iptables rule logic, chain structure, and building a sensible default policy from scratch.
A practical walkthrough of SSH hardening steps that meaningfully reduce your attack surface without breaking anything.
How passive reconnaissance using open source intelligence reveals more than most people expect, without sending a single packet.
Using tcpdump to capture, filter, and interpret live network traffic from the command line.
Here i will be explore the intersection between rootless containers, immutable operating systems, and the open source ethos in a world increasingly defined by security and trust.
How securing my personal setup with unix tools and self-hosted solutions mirrors enterprise security practices.
A walkthrough of using chkrootkit to scan for hidden rootkits and ensure host system integrity.
A Python script that reads log files, detects suspicious patterns such as failed logins and access violations, and reports potential threats for security analysis.
A Python script that opens a file, reads and parses a list of IP addresses, removes unauthorized entries, and rewrites the cleaned list.