MattCASmith
Cyber Security posts
Blog index
All posts
ALL
CYBER SECURITY
TECHNOLOGY
PROGRAMMING
DESIGN
OFF-TOPIC
2024-07-20
Endpoint detection and response (EDR) - setting the record straight
2023-11-26
Centralisation, repeatability, and automation in a modular SOC
2023-03-26
Cyber security sometimes means learning things backwards
2022-12-14
Investigating Explorer's temporary ZIP folders and retrieving files
2022-12-03
Parsing login sessions from the Windows event log with PowerShell
2022-02-22
Linux .bash_history: Basics, behaviours, and forensics
2022-01-08
SANS Holiday Hack Challenge 2021: Slot machine walkthrough
2022-01-08
SANS Holiday Hack Challenge 2021: Yara rule analysis walkthrough
2021-05-01
Installing Splunk Free in a virtual machine for log analysis
2021-04-02
File carving: Recovering a deleted file from a Windows disk image
2020-12-22
The best cyber security and technology books I read during 2020
2020-09-12
Cracking a password-protected ZIP file with fcrackzip
2020-09-02
Network connections and packet crafting on the Linux command line
2020-07-18
Technicolor TG582n router: The missing event logging manual
2020-05-02
Why virtual cyber security conferences should be the new normal
2020-03-28
SANS FOR508: I’m now a GIAC Certified Forensic Analyst
2020-02-15
Setting up Pi-hole to rein in an extremely noisy Samsung Smart TV
2020-02-02
Long-form – HTTPS and VPNs: How private is your internet browsing?
2019-11-30
Update: Cyber security projects, another trip to Japan, and plans for 2020
2019-08-26
Update: I’m back, and Def Con has inspired me to get hacking
2019-04-21
The Twitch streamer who wastes tech support scammers’ time
2019-04-14
Python tools for Windows forensics: Mozilla Firefox browsing history
2019-04-07
Investigating external network connections with netstat and OSINT
2019-03-15
Python tools for Windows forensics: Microsoft Office recent files
2019-02-15
Python tools for Windows forensics: Extracting a user’s Google Chrome history
2019-01-18
Python tools for Windows forensics: Windows Security event log
2018-12-15
Python tools for Windows forensics: Deleted files in the Recycle Bin
2018-12-08
Cyber skills gap: Raising awareness of cyber security opportunities
2018-11-23
Python tools for Windows forensics: Parsing Prefetch program data
2018-11-03
Review – Threat Modeling: Designing for Security by Adam Shostack
2018-10-19
SANS FOR500: I’m now a GIAC Certified Forensic Examiner
2018-09-22
Approaching incident response on the front foot with the HARM method
2018-09-14
Visualising connected hosts with a Python-generated network diagram
2018-09-07
Seven things I’ve learnt in my first year as a cyber security consultant
2018-08-24
A Python script to make sense of multi-dimensional Splunk exports
2018-08-10
Review – InfoSec Rock Star: Because Geek Will Only Get You So Far
2018-07-22
Security log analysis: How to group by two fields in Splunk
2018-06-23
How passwords work – a simple demonstration in Python
2018-06-01
What a security operations centre (SOC) is and how it works
2018-05-13
Checking DNS requests against a domain blacklist in Python
2018-04-29
Automatically generating SOC emails with a Python script
2018-04-08
Incident triage: Identifying the source of a malware infection
2018-01-20
What cyber security courses don’t prepare you for
2017-11-18
Three of the best cyber security podcasts around
2017-11-11
Update: I now work in cyber security
2017-04-03
Rick Sanchez explains command injection
2017-03-27
Finishing line: I’ve passed my GCIH exam!
2017-03-24
Automating a brute force web attack
2017-03-18
How I became a Linux person
2017-03-09
Flaws are more troubling than surveillance
2017-02-24
Halfway point: I’m now GSEC certified!
2017-02-09
Hackers look just like you and me
2017-02-03
Yes, your OS needs anti-virus software
2017-01-09
CES’s gadgets create new data to be stolen
2017-01-06
2017: New challenges for a new year
2016-02-07
Talking cyber security on Chicago radio