Skip to content
-
Security You Can Trust, Expertise You Can Rely On. TekGenX Consulting
NetwerkLABS

Powered By TEKGENX CONSULTING

  • Home
  • BLUE TEAM
    • MITRE ATT&CK
    • INFOSEC Governance and Regulation
      • NIST
        • IDENTIFY
        • PROTECT
        • DETECT
        • RESPOND
        • RECOVER
      • Risk Management
    • SOC
      • Threat Detection and Incident Response
        • Threat Detection EngineeringA practical course on Threat Detection Engineering using Elastic SIEM/EDR
        • Threat Hunting
          • Traffic Analysis
        • Splunk
          • Splunk Basics
          • Understanding Log Sources
          • Dashboards and Reports
          • Exploring SPL
          • Incident Handling with Splunk
          • Investigating with Splunk
    • Security+
    • Scripting
      • Bash Scripting
      • Python
      • ZyBER-TOOLS
  • ZyBER-SERIES
    • Wazuh – SIEM and XDRThe Open Source Security Platform that provides Unified XDR and SIEM protection for endpoints and cloud workloads
    • Attack and Defend Active Directory
    • Offensive Testing Enterprise Networks
    • Threat Detection EngineeringA practical course on Threat Detection Engineering using Elastic SIEM/EDR
    • F5 Local Traffic Manager (LTM)F5 Local Traffic Manager (LTM)
    • Incident Response and Forensics
    • Red Team Engagements
  • ZyBER-INTEL
  • ZyBER-NEWS
  • Cookie Policy (EU)
Subscribe

Posts by Bharath Narayanasamy

  • Home
  • Bharath Narayanasamy
  • Page 2
Avatar photo
About Bharath Narayanasamy
Bharath Narayanasamy is the principal cybersecurity consultant at TekGenX, specializing in offensive security, detection engineering, incident response, and GRC. Certified in CySA+, eJPTv2, Security+, CCNA, CCSA, and ISO 27001 Lead Implementer & Lead Auditor, he delivers end-to-end security solutions that transform complex requirements into measurable, resilient outcomes.
Install Docker on ParrotOS
Posted inPractical LABS

Install Docker on ParrotOS

Docker Setup on ParrotOS 6.3 In this tutorial, we’ll walk you through a foolproof, up-to-date method for getting Docker up and running on the latest release of Parrot OS (March,…
Read More
Posted by Avatar photo Bharath Narayanasamy
Hunting the hunters: DFIR with Velociraptor (PART-II)
Posted inDFIR

Hunting the hunters: DFIR with Velociraptor (PART-II)

We covered the deployment of Velociraptor Server and Client components in the first part of this series. You can read it here if you're interested. This part of the series…
Read More
Posted by Avatar photo Bharath Narayanasamy
Hunting the hunters: DFIR with Velociraptor (PART-I)
Posted inDFIR

Hunting the hunters: DFIR with Velociraptor (PART-I)

Introduction In the ever-evolving world of Digital Forensics and Incident Response (DFIR), having a powerful tool at your disposal is essential. Velociraptor stands out as an advanced, open-source endpoint monitoring,…
Read More
Posted by Avatar photo Bharath Narayanasamy
Caldera: Simulating a Complete Attack Chain
Posted inRED TEAM

Caldera: Simulating a Complete Attack Chain

Attack Simulation In this blog post, we will explain the options to customise the Caldera framework and emulate an attack chain that traverses from Initial Access to Achieving the Objective.…
Read More
Posted by Avatar photo Bharath Narayanasamy
Installing Caldera on ParrotOS: A Smoother Experience Compared to Ubuntu and Kali Linux
Posted inRED TEAM

Installing Caldera on ParrotOS: A Smoother Experience Compared to Ubuntu and Kali Linux

Introduction MITRE Caldera is a powerful adversary emulation platform used for cybersecurity testing and red teaming. However, recent attempts to install Caldera on Ubuntu and Kali Linux have been met…
Read More
Posted by Avatar photo Bharath Narayanasamy
Vulnerability Management: FARADAY
Posted inSOC Analyst BLUE TEAM Vulnerability Scanning

Vulnerability Management: FARADAY

Faraday: Open Source Vulnerability Manager Faraday is a powerful open-source vulnerability management platform designed to help cybersecurity teams streamline their pentesting, vulnerability assessment, and remediation processes. Built with a collaborative…
Read More
Posted by Avatar photo Bharath Narayanasamy
Atomic Red Team – A Framework for Threat Emulation: PART II
Posted inRED TEAM

Atomic Red Team – A Framework for Threat Emulation: PART II

This is the PART II article in the Atomic RED series. Please follow this link to read PART I of the series. Listing Atomic Techniques We can use the parameters…
Read More
Posted by Avatar photo Bharath Narayanasamy
Atomic Red Team – A Framework for Threat Emulation: PART I
Posted inRED TEAM

Atomic Red Team – A Framework for Threat Emulation: PART I

Overview What is Atomic Red Atomic Red Team is an open-source framework designed for security testing and threat emulation. It allows security professionals to simulate real-world cyberattacks and assess the…
Read More
Posted by Avatar photo Bharath Narayanasamy
Data Manipulation in Splunk: PART II
Posted inSplunk Splunk Basics

Data Manipulation in Splunk: PART II

Event Boundaries Event breaking in Splunk refers to breaking raw data into individual events based on specified boundaries. Splunk uses event-breaking rules to identify where one event ends, and the next begins. In the…
Read More
Posted by Avatar photo Bharath Narayanasamy
Data Manipulation in Splunk: PART I
Posted inSplunk Basics Splunk

Data Manipulation in Splunk: PART I

Splunk Log Parsing and Transformation Configuration Splunk needs to be properly configured to parse and transform the logs appropriately. Some of the issues being highlighted are: Event Breaking: Ensure Splunk…
Read More
Posted by Avatar photo Bharath Narayanasamy

Posts pagination

Previous page 1 2 3 4 … 17 Next page

Recent Posts

  • The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: II)
  • The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: I)
  • RED Teaming: Mythic C2 Framework
  • Installing OpenBAS: The OpenSource Breach and Attack Simulation
  • Metasploit Framework (MSFconsole) Cheatsheet

Categories

AD AD attacks brute-force caldera dfir drupal Elastic linux LTM NIST red-team SIEM snort splunk Threat Intel threat_detection Threat_hunting vulnhub wazuh wireshark

Copyright 2025 — NetwerkLABS. Powered by TekGenX Consulting. All rights reserved.
Scroll to Top

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by