CYBERSECURITY
BLUE TEAM CONTENT

This blog is not intended to be a guide or a tutorial by any meaning. What this website presents is my humble knowledge accumulated over the years.

This journal blog presents my methodological approach/notes to solving investigations/challenges covering areas such as phishing analysis, network traffic analysis, security monitoring, threat intelligence, SIEM, digital forensics, incident response, and generic cybersecurity-related content.

* Currently in progress – TCM Security PSAA (Practical SOC Analyst Associate) Certification – Expected Completion: December 2025

* New content will be added frequently; thank you for taking the time to visit.

TRYHACKME ROOMS

Windows Forensic 1 Investigation

What is rid Microsoft? When a DC creates a security principal object such as a user or group, it...

Windows Forensic 2 Investigation

IMPORTANT NOTES NTFS – Master File Table Like the File Allocation Table, there is a Master...

Phishing Analysis Fundamentals

In the attached virtual machine, view the information in email2.txt and reconstruct the PDF using...

BLUE TEAM LABS ONLINE

Sukana (Retired Investigation)

Scenario – Desi Sukana is an aspiring DFIR Analyst. These are professionals who gather and...

Sticky Situation (Retired Investigation)

Scenario – A highly confidential document has been stolen from the President’s laptop...

Countdown (Retired Investigation)

Scenario – In a race against time, can you investigate a laptop seized by law enforcement to...

Drilldown (Retired Investigation)

Scenario – Your organization doesn’t use Amazon Web Services, so when a Threat Hunter...

CYBERSECURITY MISCELLANEOUS

Blue Team Level 1 Certification Experience

Experience taking the BTLO1 As a reference, before taking the BTL1 exam, I had my Sec+ and I was...