portfolio 9
- passive OSINT: mapping an attack surface before you touch anything
- log analysis for activity detection
- automation of IP removal from an allow list thanks to python
- Incident Journal: Events & Experiences
- file integrity verification with hashing using CertUtil
- intercepting HTTP logins with Wireshark
- analyzing a TCP handshake in Wireshark
- SSH & DNS analysis
- nmap local open port scan