ravinderyadav.com
  • Home
  • About
  • Portfolio
  • Contact
  • Blog
Select Page
From PCAP to RCA: Building the Story Behind a Network-Based Attack

From PCAP to RCA: Building the Story Behind a Network-Based Attack

by rkyadav245833@gmail.com | Jul 16, 2025 | Uncategorized

Got it, let’s dive deeper into the technical aspects of PCAP analysis for network-based attacks. From PCAP to RCA: A Technical Deep Dive into Network Attack Storytelling Understanding the intricate details of a network-based attack requires a meticulous...
A Beginner’s Guide to Investigating Windows Event Logs in a SOC Environment

A Beginner’s Guide to Investigating Windows Event Logs in a SOC Environment

by rkyadav245833@gmail.com | Jul 16, 2025 | Uncategorized

In any Security Operations Center (SOC), Windows Event Logs are one of the most essential and frequently used data sources for threat detection and incident investigation. Whether you’re working in a Tier 1 analyst role or just starting your cybersecurity...
Detecting Persistence Techniques with Sysmon and Event Logs: A Practical Walkthrough

Detecting Persistence Techniques with Sysmon and Event Logs: A Practical Walkthrough

by rkyadav245833@gmail.com | Jul 15, 2025 | Uncategorized

Persistence is a crucial stage in the cyber attack lifecycle. After gaining initial access, adversaries often implant mechanisms that allow them to maintain foothold on a compromised system—surviving reboots, credential resets, or even defensive actions. Detecting...

Recent Posts

  • From PCAP to RCA: Building the Story Behind a Network-Based Attack
  • A Beginner’s Guide to Investigating Windows Event Logs in a SOC Environment
  • Detecting Persistence Techniques with Sysmon and Event Logs: A Practical Walkthrough

Recent Comments

No comments to show.

Archives

  • July 2025

Categories

  • Uncategorized