Back to all projects





57133923
Part 28: Investigating the Mythic C2 Framework
2024-11-28
Samson Otori
Personal Project
Blue Team

Project Gallery

C2
Mythic
SOC
Security
Investigation
Continue Reading
PreviousProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 27 of 30

Part 27: Investigating an RDP Brute Force Attack
Day 27 of the 30-Day MYDFIR SOC Analyst Challenge: Analyzing and investigating RDP brute force attacks using security tools and automated t…
Nov 27, 2024
Read previous
NextProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 29 of 30

Part 29: Installing and Exploring Elastic Defend on Windows Server
Day 29 of the 30-Day MYDFIR SOC Analyst Challenge: Setting up and testing Elastic Defend EDR solution for comprehensive endpoint protection.
Nov 29, 2024
Read next
Related Projects
Oldest Projects
Newest Projects

Blue Team
Project 6.0: LOG(N) Pacific Internship – Vulnerability Management: Windows Authenticated vs Unauthenticated Scanning with Tenable
Nov 21Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 2: The Threat Hunt)
Nov 17Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 1: Malicious Activity Simulation)
Nov 17Project
Project Categories
All
Cloud
Blue Team
Red Team
Infrastructure