Back to all projects





61173923
Part 19: Creating an Attack Diagram
2024-11-19
Samson Otori
Personal Project
Blue Team

Project Gallery

Attack Diagram
Draw.io
SOC
Security
Threat Detection
Continue Reading
PreviousProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 18 of 30

Part 18: Understanding Command and Control (C2)
Day 18 of the 30-Day MYDFIR SOC Analyst Challenge: Exploring C2 frameworks, their importance in cyberattacks, and preparing for Mythic impl…
Nov 18, 2024
Read previous
NextProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 20 of 30

Part 20: Setting Up Mythic C2
Day 20 of the 30-Day MYDFIR SOC Analyst Challenge: Deploying and configuring Mythic C2 framework on a cloud server with enhanced security s…
Nov 20, 2024
Read next
Related Projects
Oldest Projects
Newest Projects

Blue Team
Project 6.4: Agent-Based Vulnerability Monitoring on Linux with Tenable Nessus Agent
Dec 5Project

Blue Team
Project 6.3: Agent-Based Monitoring on Windows 11 Using Tenable Nessus Agents
Nov 28Project

Blue Team
Project 6.2: LOG(N) Pacific Internship – Windows 11 Compliance Scanning Using a Custom Tenable Scan Template
Nov 25Project
Project Categories
All
Cloud
Blue Team
Red Team
Infrastructure