PinnedPratinav ChandrainInfoSec Write-upsLog4j zero-day vulnerability : Exploitation, Detection & MitigationCVE-2021-44228 : Log4Shell/Log4JamDec 15, 2021Dec 15, 2021
PinnedPratinav ChandrainInfoSec Write-upsWindows Threat Hunting : Processes of InterestA list of common Windows processes and how they can be maliciously used by hackersSep 26, 20211Sep 26, 20211
PinnedPratinav ChandrainInfoSec Write-upsWindows Threat Hunting : Processes of Interest (Part 2)A list of common Windows processes and how they can be used maliciously by hackersSep 27, 2021Sep 27, 2021
Pratinav ChandrainInfoSec Write-upsCyberDefenders Walkthrough : Intel101An OSINT CTF ChallengeOct 6, 2021Oct 6, 2021
Pratinav ChandraConvert Your Old Laptop Into a Security Monitoring & URL Filtering Server (Part 3)Setting up Grafana & EnhancementsSep 23, 20211Sep 23, 20211
Pratinav ChandraConvert Your Old Laptop Into a Security Monitoring & URL Filtering Server (Part 2)Pi-hole & Prometheus ConfigurationSep 23, 20211Sep 23, 20211
Pratinav ChandraConvert Your Old Laptop Into a Security Monitoring & URL Filtering Server (Part 1)Tool discussion and initial setupSep 23, 2021Sep 23, 2021