Brandon Webb's repositories

Digital-Forensics-Scenario

Scenario: Digital Forensics, completed a final report to present findings. Gathered evidence from an iPhone image file. Looking at WiFi and GPS info, photos and conversations, analyzed the evidence and created timestamps using autopsy.

Supporting-the-SOC-Infrastructure-Final-Project-3

Scenario: Working as a Security Engineer for X-CORP, supporting the SOC infrastructure. The SOC Analysts have noticed some discrepancies with alerting in the Kibana system and the manager has asked the Security Engineering team to investigate. Started with confirming that newly created Kibana alerts are working, after which monitored live traffic on the wire to detect any abnormalities that aren't reflected in the alerting system. Reported back all findings to both the SOC manager and the Engineering Manager with appropriate analysis.

Capstone-Engagement-Project-2

Team scenario with the role of both pentester and SOC analyst. As the Red Team, attacked a vulnerable VM within your environment, ultimately gaining root access to the machine. As Blue Team, used Kibana to review logs taken during day 1 engagement. Used the logs to extract hard data and visualizations for reporting. Then, interpreted log data to suggest mitigation measures for each exploit that was successfully performed.

Awesome-Hacking

A collection of various awesome lists for hackers, pentesters and security researchers

License:CC0-1.0Stargazers:1Issues:0Issues:0

Elk-Stack-Project-1

Configure an ELK stack server in order to set up a cloud monitoring system. Deploy containers using Ansible and Docker, deploy Filebeat and Metricbeat using Ansible, deploy the ELK stack on a server, diagram networks, and created a README, Craft documentation and interview responses to effectively communicate your achievements.

Network-Security

Week 11 Network Security Submission

Public-Key-Infrastructure-PKI

The systems of PKI are dependent on digital signatures which can be independently verified to prove that the owner of the private key counterpart to the public key is indeed the issuer of the signature. These signatures are used to form digital certificates. Trust in the PKI is based on the community as a whole in the case of distributed setups or on certificate authorities who verify signatures and collect personal information on clients in the PKI for the purpose of identity verification.