On a Saturday evening I spent some time in upgrading my MacBook Pro with an SSD. The only SSD I had was having security Onion
Year: 2015
Information gathering is considered first and most important part before launching any types of attacks, hacking or penetration testing. Information gathering is known by several
TOR – The onion routing – famous for anonymity. TOR browser gives user an edge to be anonymous while browsing. Installing TOR on windows box
Received a interesting email yesterday from Mr. Gordon Hills from London who wanted me to be partner and 5 Million dollars will be released to
Looking for reputation of an IP address is one of the most frequent task of an SOC analyst. There are number of online tools and
In my previous post regarding Westpac phishing mail, I mentioned associated domain and IP address. Recently, I am diving into the threat intelligence and especially
Malicious or spam emails are frequent but one of the best ways to get a system/host infected. Recently I received an email from one of
Received an email from UN@ – no email domain on the sender list and that’s why my email identified as spam. Attachment was a doc
Been using Security Onion for a while now. A very good OS for analysis and getting IDS alerts on the go without installing expensive hardware.
Based on my previous blog entry about emails I have analysed an email that was received from *@ndis.gov.au. From the email it seems that you