19 Curated Hands-On Labs For The Junior SOC Analysts To Help You Stand out In An Interview
You have conquered the CompTIA Security+, and now you are starting the job hunt. You are worried that you have no idea how to use SOC Analyst tools or what they are.
This article will cover the top tools used in the SOC and places to get hands-on experience.
Most of these will be from HackTheBox and TryHackMe because I am familiar with the platforms, and they are the leading providers for cheap online labs at the moment.
If you find any other sites with high-quality labs, please let me know. I would love to share them with the world.
The windows registry isn’t the backbone of Windows. Still, you could argue that the registry hives are the arteries of the Windows anatomy. Instead of controlling the blood flow, the hives control how Windows operates by storing various configurations. But that isn’t all the registry is good for. Both defenders and attackers can make use of the repository for their own ends: the blue team can find forensic artifacts and the red team can create persistence.
In this blog, we explore the architecture of the Windows 10 Registry and what it means to an infosec practitioner.
A discussion of Zeltser's "Malware Analysis Essentials for Incident Responders" video
Today, I brushed up on my malware analysis and found a fantastic resource for those wanting to learn about malware analysis. Like many things in information security, malware analysis is a culmination of many skillsets. Due to the requirement of all these skills, the topic seems a little unapproachable.
Luckily one of the excellent instructors over at SANs institute, Lenny Zeltser, gave a talk last year at RSA titled “Practical Malware Analysis Essentials for Incident Responders.”
This post will summarise the video content with a little input from my own experiences but, I encourage you to follow the link to the video for a fantastic primer on malware analysis by the always entertaining Lenny Zeltser.