My Project Journal

Security experiments, tutorial recreations & original builds – documenting my hands-on progress

Project 6.0: LOG(N) Pacific Internship – Vulnerability Management: Windows Authenticated vs Unauthenticated Scanning with Tenable
Blue Team

Project 6.0: LOG(N) Pacific Internship – Vulnerability Management

In this project, I walked through the practical difference between authenticated and unauthenticated scans by deploying a Windows virtual machine in Azure and scanning it using Tenable’s cloud-based scanner.

1 Part

Vulnerability ManagementTenableAzure+5
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 1: Malicious Activity Simulation)
Blue Team
Cloud

Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario

Simulating malicious employee behaviour in a controlled cyber-range environment by downloading and using TOR Browser on a corporate workstation, generating telemetry for threat hunting analysis in Microsoft Defender for Endpoint.

2 Parts

Blue TeamCloudThreat Hunting+6
Project 5.8: LOG(N) Pacific Internship – Incident Response Scenario: Excessive Azure Resource Creation or Deletion
Blue Team
Cloud

Project 5.8: LOG(N) Pacific Internship – Incident Response Scenario: Excessive Azure Resource Creation or Deletion

Detecting and investigating anomalous Azure resource lifecycle operations using Microsoft Sentinel, identifying excessive resource creation and deletion patterns that may indicate unauthorized automation or compromised service principals.

1 Part

Blue TeamCloudIncident Response+6
Project 5.7: LOG(N) Pacific Internship – Incident Response Scenario: Impossible Travel Detection with Microsoft Sentinel
Blue Team
Cloud

Project 5.7: LOG(N) Pacific Internship – Incident Response Scenario: Impossible Travel Detection with Microsoft Sentinel

Analysing identity-based threat scenarios through impossible travel detection in Microsoft Sentinel, evaluating Azure AD authentication patterns, and executing full incident response following NIST 800-61 guidelines.

1 Part

Blue TeamCloudIncident Response+8
Project 5.6: LOG(N) Pacific Internship – Incident Response Scenario 2: PowerShell Suspicious Web Request with Microsoft Sentinel
Blue Team
Cloud

Project 5.6: LOG(N) Pacific Internship – Incident Response Scenario 2: PowerShell Suspicious Web Request with Microsoft Sentinel

Detecting PowerShell-based web payload staging, building Sentinel analytics for Invoke-WebRequest abuse, and walking through end-to-end incident response with Microsoft Defender for Endpoint and Sentinel.

1 Part

Blue TeamCloudIncident Response+6
Project 5.5: LOG(N) Pacific Internship – Incident Response Scenario 1: Brute Force Attack Detection with Microsoft Sentinel
Blue Team
Cloud

Project 5.5: LOG(N) Pacific Internship – Incident Response Scenario 1: Brute Force Attack Detection with Microsoft Sentinel

Investigating a simulated brute-force attack scenario using Microsoft Sentinel and Defender for Endpoint, following the NIST 800-61 incident response lifecycle.

1 Part

Blue TeamCloudIncident Response+6
Project 5.4: LOG(N) Pacific Internship: Threat Hunting Scenario 4: PwnCrypt Ransomware Outbreak
Blue Team
Cloud

Project 5.4: LOG(N) Pacific Internship: Threat Hunting Scenario 4: PwnCrypt Ransomware Outbreak

A comprehensive threat hunting exercise investigating a PwnCrypt ransomware outbreak, using Microsoft Defender for Endpoint to analyze file encryption activities, process execution chains, and ransomware indicators of compromise.

1 Part

Blue TeamCloudThreat Hunting+6
Project 5.3: LOG(N) Pacific Internship: Threat Hunting Scenario 3: Suspected Data Exfiltration
Blue Team
Cloud

Project 5.3: LOG(N) Pacific Internship: Threat Hunting Scenario 3: Suspected Data Exfiltration

A comprehensive threat hunting exercise investigating suspected data exfiltration by a disgruntled employee, using Microsoft Defender for Endpoint to identify unauthorized archiving and data transfer activities within the network.

1 Part

Blue TeamCloudThreat Hunting+6
Project 5.2: LOG(N) Pacific Internship: Threat Hunting Scenario 2: Sudden Network Slowdown
Blue Team
Cloud

Project 5.2: LOG(N) Pacific Internship: Threat Hunting Scenario 2: Sudden Network Slowdown

A comprehensive threat hunting exercise investigating sudden network performance degradation caused by internal port scanning activity, using Microsoft Defender for Endpoint to identify unauthorized reconnaissance within the network.

1 Part

Blue TeamCloudThreat Hunting+6
Project 5.1: LOG(N) Pacific Internship: Threat Hunting Scenario 1: Devices Exposed to the Internet
Blue Team
Cloud

Project 5.1: LOG(N) Pacific Internship: Threat Hunting Scenario 1: Devices Exposed to the Internet

A comprehensive threat hunting exercise investigating devices accidentally exposed to the internet, using Microsoft Defender for Endpoint and Microsoft 365 Security suite to analyze brute-force attempts and validate unauthorized access.

1 Part

Blue TeamCloudThreat Hunting+5
Project 5: LOG(N) Pacific Internship: Cyber Range Journey
Blue Team
Cloud

Project 5: LOG(N) Pacific Internship: Cyber Range Journey

An immersive journey into enterprise-grade cybersecurity tools through the Cyber Range internship program, focusing on Microsoft Azure, Sentinel, Defender for Endpoint, and Tenable vulnerability management.

1 Part

Blue TeamCloudSOC+5
Project 4.7: TheHive & Cortex Deployment in My Cybersecurity Home Lab
Blue Team

Project 4.7: TheHive & Cortex Deployment in My Cybersecurity Home Lab

Deploying TheHive incident response platform and Cortex automated analysis engine in my segmented cybersecurity home lab for enhanced SOC workflow capabilities.

1 Part

TheHiveCortexIncident Response+9