Skip to content

Threat Hunting, Network Security Monitoring and Reporting.

Notifications You must be signed in to change notification settings

Sk3llington/Threat-Hunting

Repository files navigation

Threat-Hunting

Network Security

Snort Rule Analysis

In this section, I analyzed Snort rule logs including malicious scans of a network, phishing attack logs and download of malicious payloads.

You can access the full report here: Snort Rule Analysis

Firewall Basic Security Configuration

In this section I go over a basic configuration of a free open-source firewall, firewalld.

You can access the configuration demonstration here: Firewalld Configuration

Hunting the Nemucod Trojan

In this section, I used logs generated by Snort to track the Nemucod trojan, analyze the IOCs and write a report with mitigation recommendations.

You can access the full report here: Nemucod Trojan Hunt

About

Threat Hunting, Network Security Monitoring and Reporting.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published