BLOG
feb 2026
TryHackMe ItsyBitsy — Investigating C2 Communication with ELK Stack
SIEM investigation using ELK to detect C2 communication. BITSAdmin abuse, Pastebin payloads, and MITRE ATT&CK mapping.
coming soonTryHackMe Benign — Investigating Suspicious Process Execution with Splunk
Analyzing anomalous process execution on a compromised host using Splunk for threat detection and investigation.
coming soonTBA
Walkthrough coming soon.