Attending the Network Security Monitoring Operator: A Journey Through Network Security and Incident Response Recently, I had the privilege of attending the Elasticsearch Security Operations training, an in-depth course designed to strengthen understanding of network security monitoring, incident detection, and analysis using tools like Suricata, Zeek, and Kibana. This five-day course offered a comprehensive look […]
Introduction to Hardware Hacking with UART Hardware hacking is a fascinating field that involves breaking into and exploring the inner workings of hardware devices to understand their functionality, exploit vulnerabilities, and modify or reverse-engineer them. One of the most common and accessible interfaces in hardware hacking is UART (Universal Asynchronous Receiver/Transmitter). It allows direct communication […]
Welcome to My Blog: A Journey of Projects and Knowledge Sharing Hello and welcome to my blog! I’m excited to finally launch this space where I’ll be sharing a mix of personal projects, the techniques I’ve explored along the way, and some lessons learned through my hands-on experiences. Whether you’re a fellow creator, curious learner, […]