
Atlas Security
@Atl4sCyberSec
Followers
3
Following
55
Media
45
Statuses
221
Documenting my #cybersecurity journey🛣Sharing insights on security practices, standards, and findings. Join me as we navigate the world of cyber threats👾🖥️🛜
The Internet
Joined February 2025
7/ 🔐 Final verdict: This lab is a must-do if you’re into blue team ops, log analysis, or just learning how attackers actually get in. Check out my full Walkthrough ⬇️ 👉 https://t.co/zIuF9Os1ED
#CyberSecurity #BlueTeam #Wireshark
medium.com
Tracing a Brute Force Attack from PCAP to Password: A Blue Team Investigation
0
0
1
6/ It wasn’t all smooth sailing. 😅 Challenges included: – Identifying success in a sea of “Incorrect” messages – Cross-referencing logs with packet data – Navigating RDP-specific indicators like clientName
1
0
0
One of the most useful skills I applied? ⚡️ Exporting traffic and parsing it with Linux commands: grep, uniq, less — powerful for filtering thousands of lines quickly. Also learned: follow the HTTP stream = gold. #WiresharkTips
1
0
0
Using Wireshark, I filtered HTTP POST traffic to isolate login attempts. 🔍 After scanning through traffic and logs, I identified: – The attacker’s IP – The login directory – The correct username & password used – Attempts made via RDP & SSH
1
0
0
3/ The challenge was from @LetsDefendIO: 📂 I was given two pieces of forensic evidence: – A .pcap file (packet capture) – A Linux auth.log authentication file My goal? Trace the attacker and figure out how they broke in.
1
0
0
2/ Brute force attacks might sound old-school… But they’re still wildly effective—especially when login systems lack proper protections like rate limiting, MFA, or lockout policies. They’re loud, simple, and still work
1
0
0
🧵1/ 🔐 Ever wondered how a brute force attack actually plays out in a real-world scenario? I just completed a hands-on lab simulating a credential-based attack—and here's a breakdown of what I learned + how you can spot and stop it. 👇 #BruteForceAttack #Cybersecurity #InfoSec
1
0
1
9/9 Understanding lateral movement isn't just theoretical—it's essential for modern defense. Check out my walkthrough and let me know your thoughts! #CyberSecurity #LateralMovement #ThreatHunting #InfoSec #NetworkSecurity #PsExec #CyberDefense #DFIR #BlueTeam #SecurityOperations
0
0
0
8/9 I've documented my entire analysis process, detection methods, and defense strategies in a detailed walkthrough that will help you identify these attacks in your environment: https://t.co/WVXJLG3u7v
github.com
CyberDefenders — PsExec hunt Lab Walkthrough. Contribute to Mi117/CyberDefenders----PsExec-Hunt-Lab development by creating an account on GitHub.
1
0
0
7/9 I recently completed the @CyberDefenders "PsExec Hunt" challenge, analyzing how attackers leverage @Microsoft's PsExec tool for lateral movement—a technique seen frequently in real-world breaches.
1
0
0
6/9 Effective defense requires layered protection: network segmentation, privileged access management, advanced monitoring, and behavior-based analytics that can spot anomalous activities.
1
0
0
5/9 These methods let attackers elevate privileges, access sensitive systems, establish multiple backdoors, and bypass your carefully planned security controls—all while appearing like normal network traffic.
1
0
0
4/9 Common techniques include credential theft (Pass-the-Hash/Ticket), abusing admin tools (PsExec, WMI, PowerShell Remoting), internal phishing, and hijacking remote sessions like RDP.
1
0
0
3/9 What makes this so dangerous? Stealth. Attackers blend with legitimate traffic, making their movements nearly invisible to traditional security tools. They're effectively hiding in plain sight.
1
0
0
2/9 Lateral movement is how attackers spread through your network after gaining initial access. Instead of exploiting just one system, they move strategically across your infrastructure hunting for valuable data and higher privileges.
1
0
0
1/9 As modern networks expand, so does the attacker's playground. Let me break down one of the most dangerous phases of advanced cyber attacks: LATERAL MOVEMENT. #CyberSecurity #SOC #MITREATTnCK #T1021 #IncidentResponse #EnterpriseSecurity #DigitalForensics Time for a🧵
1
0
0
7/7 These skills are invaluable in today's digital landscape. Excited to apply these techniques in my professional work! 🛡️ 💻 #OSINT #OpenSourceIntelligence #FinancialInvestigation #CyberSecurity #IntelligenceAnalysis #BaselInstitute #DigitalSkills
1
0
0
6/7 The self-paced format was perfect for deep engagement with each module. While no prior OSINT experience was required, I'd recommend basic familiarity with online research for anyone considering this certification. Check it out 🔗 https://t.co/cQQnL0rnA3
1
0
1
5/7 What surprised me most was how seemingly disconnected pieces of online information can create a comprehensive picture when properly analyzed. The structured approach to compiling findings into actionable intelligence reports is game-changing.
1
0
0
4/7 The training covered advanced techniques for extracting intelligence from social media platforms, investigating online communities, and even navigating dark web pages & cryptocurrency transactions. Each session built systematically on previous knowledge.
1
0
0