Back to all projects





57133923
Part 19: Creating an Attack Diagram
2024-11-19
Samson Otori
Personal Project
Blue Team

Project Gallery

Attack Diagram
Draw.io
SOC
Security
Threat Detection
Continue Reading
PreviousProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 18 of 30

Part 18: Understanding Command and Control (C2)
Day 18 of the 30-Day MYDFIR SOC Analyst Challenge: Exploring C2 frameworks, their importance in cyberattacks, and preparing for Mythic impl…
Nov 18, 2024
Read previous
NextProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 20 of 30

Part 20: Setting Up Mythic C2
Day 20 of the 30-Day MYDFIR SOC Analyst Challenge: Deploying and configuring Mythic C2 framework on a cloud server with enhanced security s…
Nov 20, 2024
Read next
Related Projects
Oldest Projects
Newest Projects

Blue Team
Project 6.0: LOG(N) Pacific Internship – Vulnerability Management: Windows Authenticated vs Unauthenticated Scanning with Tenable
Nov 21Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 2: The Threat Hunt)
Nov 17Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 1: Malicious Activity Simulation)
Nov 17Project
Project Categories
All
Cloud
Blue Team
Red Team
Infrastructure