by guru | Jul 18, 2019 | Blueteam, Malware Analysis
It happens everyday, something gets downloaded and noone can really be sure of what the thing is. Is it good, is it bad, what is it? In this malware analysis tutorial I showcase all the leading methods for quickly and effectively analyzing a malicious binary. A...
by The Ethical Hacking Guru | Mar 9, 2019 | Splunk
I show in this tutorial how to upgrade your Splunk to a deployment server. Here’s What You Need Splunk Enterprise – Trial license running on Ubuntu 18.04Windows 2016 Server – Evaluation license Getting Started When installing the universal forwarder...
by The Ethical Hacking Guru | Mar 2, 2019 | Nessus
Start using Nessus for free in five easy steps or if you are feeling confident about it already and want to purchase an annual subscription. Tenable’s vulnerability scanner, Nessus is a comprehensive vulnerability scanner and is one of the most popular in use...
by The Ethical Hacking Guru | Feb 2, 2019 | Go, Programming, Splunk
Making API calls to Splunk? If you have digital certificate verification turned off your connection is susceptible to man in the middle attacks. Luckily you can thwart Splunk Man In the Middle attacks with Go. Here’s What Everyone Does They disable SSL...
by The Ethical Hacking Guru | Oct 11, 2018 | Splunk
Splunk offers its Splunk fundamentals One course for free on their site. If you are looking to stack your resume with skills that are in demand look no further. This tutorial will walk you through the steps to become certified. You will also get course advice and...
by The Ethical Hacking Guru | Sep 7, 2018 | Malware Analysis
In this malware analysis tutorial I showcase all the leading methods for quickly and effectively analyzing a malicious binary. A malware lab is used by security analysts to study malware’s behavior and research its capabilities in conditions that allow for the...