• Learn More About Your Home Network with Elastic SIEM – Part 2: Collect Firewall Logs

    Learn More About Your Home Network with Elastic SIEM – Part 2: Collect Firewall Logs

    In my previous post, Learn More About Your Home Network with Elastic SIEM – Part 1: Setting Up Elastic SIEM, I explained how you could set up Elastic SIEM on a Raspberry Pi[ad]. The next thing you would want to do is to collect the logs from your firewall and analyze them. Before I jump…

  • Learn More About Your Home Network with Elastic SIEM – Part 1: Setting Up Elastic SIEM

    Learn More About Your Home Network with Elastic SIEM – Part 1: Setting Up Elastic SIEM

    Last night I had some free time to play with my network, and I ran  tcpdump out of curiosity. For a while, I’ve been interested to analyze what traffic is going through my home network, and the result of my test pushed me to get to work. I have a bunch of Raspberry Pi devices…

  • Implementing Cybersecurity Research Sandbox Environment in the Cloud

    Implementing Cybersecurity Research Sandbox Environment in the Cloud

    For a while, I’ve been planning to build a cybersecurity research environment in the cloud that I can use to experiment with and research malicious cyber activities. Well, yesterday I received the following message on my cell phone: Hello mate, your FEDEX package with tracking code GB-6412-GH83 is waiting for you to set delivery preferences:…

  • Requirements for Image Annotations

    Requirements for Image Annotations

    In my previous post What to Desire from a Good Image Annotator?, I wrote about the high-level capabilities of an Image Annotation Tool. In this one, I will go over the requirements for the actual image annotations or as you may also know it, tagging. I will use two images as examples. The first one…

  • 3 Simple Ways to Collect Social Engineering Data for Free

    3 Simple Ways to Collect Social Engineering Data for Free

    In my last post, I demonstrated how easy it is to create fake accounts on the major social networks. Now, let’s take a look at what can we do with those fake social network accounts. Also, let’s not forget that my goals here are to penetrate specific individual’s home network (in this case my own…

  • How to Prepare for Cyber Reconnaissance?

    How to Prepare for Cyber Reconnaissance?

    In my previous post, How Can I Successfully Hack My Home Network? I set the stage for my “Hacking my Home” activities. A possible scenario here is that I am given the task to penetrate a high-profile target’s (i.e., myself 😀) home network and collect as much information to use for malicious purposes. Before I…

  • How Can I Successfully Hack My Home Network?

    How Can I Successfully Hack My Home Network?

    This morning I was looking at our company’s e-mail gateway and cleaning some of the quarantined messages when I got reminded that while my company’s digital infrastructure may be well protected with firewalls and e-mail gateways, my home network can be wide open and vulnerable to attacks. Like everyone else, I try not to spend…

  • What to Desire From a Good Image Annotator?

    What to Desire From a Good Image Annotator?

    Recently, I started looking for an image annotation tool that we can use to annotate a few thousand images. There are quite a few that you can choose from. Starting with paid ones like Labelbox and Dataturks, to free and open source ones like coco-annotator, imglab and labelimg. The paid ones have also a free…