PinnedPratinav ChandrainInfoSec Write-upsLog4j zero-day vulnerability : Exploitation, Detection & MitigationCVE-2021-44228 : Log4Shell/Log4Jam6 min read·Dec 15, 2021----
PinnedPratinav ChandrainInfoSec Write-upsWindows Threat Hunting : Processes of InterestA list of common Windows processes and how they can be maliciously used by hackers4 min read·Sep 26, 2021--1--1
PinnedPratinav ChandrainInfoSec Write-upsWindows Threat Hunting : Processes of Interest (Part 2)A list of common Windows processes and how they can be used maliciously by hackers5 min read·Sep 27, 2021----
Pratinav ChandrainInfoSec Write-upsCyberDefenders Walkthrough : Intel101An OSINT CTF Challenge8 min read·Oct 6, 2021----
Pratinav ChandraConvert Your Old Laptop Into a Security Monitoring & URL Filtering Server (Part 3)Setting up Grafana & Enhancements5 min read·Sep 23, 2021--1--1
Pratinav ChandraConvert Your Old Laptop Into a Security Monitoring & URL Filtering Server (Part 2)Pi-hole & Prometheus Configuration5 min read·Sep 23, 2021--1--1
Pratinav ChandraConvert Your Old Laptop Into a Security Monitoring & URL Filtering Server (Part 1)Tool discussion and initial setup6 min read·Sep 23, 2021----