Bharath Narayanasamy is the principal cybersecurity consultant at TekGenX, specializing in offensive security, detection engineering, incident response, and GRC. Certified in CySA+, eJPTv2, Security+, CCNA, CCSA, and ISO 27001 Lead Implementer & Lead Auditor, he delivers end-to-end security solutions that transform complex requirements into measurable, resilient outcomes.
Understanding Windows Event Logs Each entry in the Windows Event Log is an "Event" and contains the following primary components: Log Name: The name of the event log (e.g., Application,…
Wireshark: Packet Operations Statistics | Summary This menu provides multiple statistics options ready to investigate to help users see the big picture in terms of the scope of the traffic,…
Different Syntax Languages Kibana supports two types of syntax languages for querying in Kibana: KQL (Kibana Query Language) and Lucene Query Syntax. Kibana Query Language (KQL) is a user-friendly query language developed by Elastic…
Game Of Active Directory The following steps explain the procedure to setup the GOADv2 LAB environment to pentest Active Directory. Warning This lab is extremely vulnerable, do not reuse recipe to…
Reference: TryHackMe Room "Core Windows Processes" Core Windows Processes Understanding how the Windows operating system functions as a defender is vital. Task Manager doesn't show a Parent-Child process view. That…
To upgrade agents using the command line, use the agent_upgrade tool as follows: List all the agents with outdated software: /var/ossec/bin/agent_upgrade -l [root@wazuh-server wazuh-user]# /var/ossec/bin/agent_upgrade -lID    Name                                Version                   001   zyberpatrol-pdc                     Wazuh v4.7.1…
Load Balancers Despite the name, a Load Balancer does not only balance the load: some of its core functionalities are: Load Balancing: of course, it has a way to determine…
Deployment Methods One-armed Deployment Two-armed Deployment nPath or Direct Server Response (DSR) Deployment One-Arm Deployment In one-arm deployment, the load balancer is not physically in line of the traffic, which…