zHeros
Diaries

"Scattering and analysing the itsy bits (0s|1s) of Cybersecurity Technologies. A topic at a time, a tool at a time."

Terraform

Automating Infrastructure as a Service (IaS). Terraform uses the HCL, Hashicorp language to write clear configuration .tf or .tf.json files.

SIEM

Security Information Event Management, Cutting edge technology for centrally managing security events. SIEM aggregates and parse data into indexes to make searching for events efficients.

OverThe Wire Bandit

CTF focused on linux commands and some git

OverThe Wire Natas

CTF focused on web-app vulns

Navigating Time Synchronization in Linux

NTP, PTP, Chrony, and NTPsec Explained. The Network time protocol is esseantial in modern computing, it's enables seamless communication among applications, makes log efficient log analysis possible, plays a critical role in financial market and many more.

The Phishing Diary

Phishing attack remains a prevalent social engineering technique. This is a continues exploration and updates on the subject. Check it out for some prevention and mitigation techniques.

Use Case in Cybersecurity

Use cases are used in varies fields to optimise goals. the simple break down on complex task for better insight on how procedures unfolds has often been a strength in solving difficult engineering tasks.