Atl4sCyberSec Profile Banner
Atlas Security Profile
Atlas Security

@Atl4sCyberSec

Followers
3
Following
55
Media
45
Statuses
221

Documenting my #cybersecurity journey🛣Sharing insights on security practices, standards, and findings. Join me as we navigate the world of cyber threats👾🖥️🛜

The Internet
Joined February 2025
Don't wanna be here? Send us removal request.
@Atl4sCyberSec
Atlas Security
2 months
7/ 🔐 Final verdict: This lab is a must-do if you’re into blue team ops, log analysis, or just learning how attackers actually get in. Check out my full Walkthrough ⬇️ 👉 https://t.co/zIuF9Os1ED #CyberSecurity #BlueTeam #Wireshark
Tweet card summary image
medium.com
Tracing a Brute Force Attack from PCAP to Password: A Blue Team Investigation
0
0
1
@Atl4sCyberSec
Atlas Security
2 months
6/ It wasn’t all smooth sailing. 😅 Challenges included: – Identifying success in a sea of “Incorrect” messages – Cross-referencing logs with packet data – Navigating RDP-specific indicators like clientName
1
0
0
@Atl4sCyberSec
Atlas Security
2 months
One of the most useful skills I applied? ⚡️ Exporting traffic and parsing it with Linux commands: grep, uniq, less — powerful for filtering thousands of lines quickly. Also learned: follow the HTTP stream = gold. #WiresharkTips
1
0
0
@Atl4sCyberSec
Atlas Security
2 months
Using Wireshark, I filtered HTTP POST traffic to isolate login attempts. 🔍 After scanning through traffic and logs, I identified: – The attacker’s IP – The login directory – The correct username & password used – Attempts made via RDP & SSH
1
0
0
@Atl4sCyberSec
Atlas Security
2 months
3/ The challenge was from @LetsDefendIO: 📂 I was given two pieces of forensic evidence: – A .pcap file (packet capture) – A Linux auth.log authentication file My goal? Trace the attacker and figure out how they broke in.
1
0
0
@Atl4sCyberSec
Atlas Security
2 months
2/ Brute force attacks might sound old-school… But they’re still wildly effective—especially when login systems lack proper protections like rate limiting, MFA, or lockout policies. They’re loud, simple, and still work
1
0
0
@Atl4sCyberSec
Atlas Security
2 months
🧵1/ 🔐 Ever wondered how a brute force attack actually plays out in a real-world scenario? I just completed a hands-on lab simulating a credential-based attack—and here's a breakdown of what I learned + how you can spot and stop it. 👇 #BruteForceAttack #Cybersecurity #InfoSec
1
0
1
@Atl4sCyberSec
Atlas Security
5 months
9/9 Understanding lateral movement isn't just theoretical—it's essential for modern defense. Check out my walkthrough and let me know your thoughts! #CyberSecurity #LateralMovement #ThreatHunting #InfoSec #NetworkSecurity #PsExec #CyberDefense #DFIR #BlueTeam #SecurityOperations
0
0
0
@Atl4sCyberSec
Atlas Security
5 months
8/9 I've documented my entire analysis process, detection methods, and defense strategies in a detailed walkthrough that will help you identify these attacks in your environment: https://t.co/WVXJLG3u7v
Tweet card summary image
github.com
CyberDefenders — PsExec hunt Lab Walkthrough. Contribute to Mi117/CyberDefenders----PsExec-Hunt-Lab development by creating an account on GitHub.
1
0
0
@Atl4sCyberSec
Atlas Security
5 months
7/9 I recently completed the @CyberDefenders "PsExec Hunt" challenge, analyzing how attackers leverage @Microsoft's PsExec tool for lateral movement—a technique seen frequently in real-world breaches.
1
0
0
@Atl4sCyberSec
Atlas Security
5 months
6/9 Effective defense requires layered protection: network segmentation, privileged access management, advanced monitoring, and behavior-based analytics that can spot anomalous activities.
1
0
0
@Atl4sCyberSec
Atlas Security
5 months
5/9 These methods let attackers elevate privileges, access sensitive systems, establish multiple backdoors, and bypass your carefully planned security controls—all while appearing like normal network traffic.
1
0
0
@Atl4sCyberSec
Atlas Security
5 months
4/9 Common techniques include credential theft (Pass-the-Hash/Ticket), abusing admin tools (PsExec, WMI, PowerShell Remoting), internal phishing, and hijacking remote sessions like RDP.
1
0
0
@Atl4sCyberSec
Atlas Security
5 months
3/9 What makes this so dangerous? Stealth. Attackers blend with legitimate traffic, making their movements nearly invisible to traditional security tools. They're effectively hiding in plain sight.
1
0
0
@Atl4sCyberSec
Atlas Security
5 months
2/9 Lateral movement is how attackers spread through your network after gaining initial access. Instead of exploiting just one system, they move strategically across your infrastructure hunting for valuable data and higher privileges.
1
0
0
@Atl4sCyberSec
Atlas Security
5 months
1/9 As modern networks expand, so does the attacker's playground. Let me break down one of the most dangerous phases of advanced cyber attacks: LATERAL MOVEMENT. #CyberSecurity #SOC #MITREATTnCK #T1021 #IncidentResponse #EnterpriseSecurity #DigitalForensics Time for a🧵
1
0
0
@Atl4sCyberSec
Atlas Security
6 months
7/7 These skills are invaluable in today's digital landscape. Excited to apply these techniques in my professional work! 🛡️ 💻 #OSINT #OpenSourceIntelligence #FinancialInvestigation #CyberSecurity #IntelligenceAnalysis #BaselInstitute #DigitalSkills
1
0
0
@Atl4sCyberSec
Atlas Security
6 months
6/7 The self-paced format was perfect for deep engagement with each module. While no prior OSINT experience was required, I'd recommend basic familiarity with online research for anyone considering this certification. Check it out 🔗 https://t.co/cQQnL0rnA3
1
0
1
@Atl4sCyberSec
Atlas Security
6 months
5/7 What surprised me most was how seemingly disconnected pieces of online information can create a comprehensive picture when properly analyzed. The structured approach to compiling findings into actionable intelligence reports is game-changing.
1
0
0
@Atl4sCyberSec
Atlas Security
6 months
4/7 The training covered advanced techniques for extracting intelligence from social media platforms, investigating online communities, and even navigating dark web pages & cryptocurrency transactions. Each session built systematically on previous knowledge.
1
0
0