To perform well and ensure its maintenance, administrators must monitor and manage events on a system, which is extremely important. Meanwhile, administrators use Event Logs,
To ensure a system performs well and maintains its integrity, it is extremely important to monitor and manage events on that system. Event Logs, which
What is a Firewall? a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security
Alternate Data Stream is an artifact of New Technology File system (NTFS) which was introduced by Windows. It was traditionally introduced so that it could
Splunk Inc. is an American public multinational corporation based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated big data via a Web-style interface. Splunk (the product) captures,
CTF’s are one of the best and probably the fun way to get hands-on pen testing experience. This one, in particular, is a great CTF
In this article, we will learn how we can swipe our footprint after hacking the victim’s system. We can achieve that with the help of
Have you ever heard about Fake services? Attackers can perform credential dumping by exploiting open ports like ftp, telnet, smb, etc. to gain sensitive data
Detecting any intrusion in your system is a very important step towards Incident response. Incident response is quite vast, but it is always better to