Hi there👋

Welcome to my cybersecurity and programming portfolio blog! 💻🛡️ Explore how code safeguards our digital world. Join me in navigating technology’s ever-changing landscape!

Charting My Cyber Security Path: A Collection of Courses and Certifications

Hey there! Welcome to my cyber security collection. If you’re here, you probably share a love for all things tech and security like I do. Over time, I’ve dived into various courses and earned certifications that have shaped my journey in cyber security. Below is a showcase of what I’ve accomplished so far, along with the skills I’ve picked up along the way. Why Cyber Security? Let’s face it—cyber threats aren’t going anywhere....

October 29, 2024 · 5 min · Tomi Mulhartono

Getting Started with Your New Application on OpenResty Edge: An Easy-to-Follow Tutorial

Welcome aboard! If you’re gearing up to launch a new application on OpenResty Edge, you’re in the right place. Whether you’re a seasoned pro or just starting out, I’ll walk you through every step of the way with a dash of fun. Grab your favorite drink, settle in, and let’s dive into this setup adventure! Creating Your New Application Let’s get that new app live and kicking in no time. Here’s how to create your first application on OpenResty Edge....

September 6, 2024 · 6 min · Tomi Mulhartono

Stay Ahead of Issues: How to Connect Grafana Alerts with Slack and Jira Using n8n

So, you’re ready to up your game and make sure you never miss a critical update? Great choice! Setting up Grafana alerts and integrating them with Slack and Jira through n8n is a powerful way to keep your team on the ball. Let’s dive in and get those workflows automated! Setting Up Grafana Alerts First up, let’s get your Grafana alerts configured so you’re always in the know. Here’s the lowdown on how to get your alerts up and running:...

August 29, 2024 · 11 min · Tomi Mulhartono

Installing Gophish on Google Cloud Platform: A Step-by-Step Guide

What is Gophish? Gophish is a powerful open-source phishing framework designed to make the process of conducting and managing phishing campaigns as straightforward as possible. Think of it as your go-to tool for simulating real-world phishing attacks. The best part? It’s free and easy to use! Affordable: Gophish is open-source software, which means you don’t have to pay a cent to use it. Accessible: Written in the Go programming language, Gophish releases are compiled binaries with no dependencies....

July 19, 2024 · 4 min · Tomi Mulhartono

From Alerts to Malware: A CyberOps Associates v1.0 Skill Assessment Guide

Have you ever wondered what security analysts actually do? Buckle up, because we’re diving into a thrilling investigation of a malware attack! Today’s culprit? The notorious Pushdo trojan. This post will take you through a simulated security assessment, mimicking the thought process and steps involved in uncovering malicious activity. We’ll dissect alerts, explore the tools used for analysis, and ultimately expose the tricks employed by Pushdo. So, grab a cup of coffee (or your beverage of choice), and let’s embark on this malware takedown adventure!...

May 30, 2024 · 7 min · Tomi Mulhartono

Hack Like a Pro: A Beginner’s Guide to Vulnhub's Basic Pentesting 1

Have you ever wanted to test your penetration testing skills in a safe environment? Look no further than Vulnhub’s Basic Pentesting 1 machine! This virtual machine is designed specifically for beginners like me, offering a controlled space to learn the ropes of exploiting vulnerabilities and gaining access. In this guide, I’ll walk you through the thrilling journey of taking down Basic Pentesting 1, step-by-step. So, grab your tools and get ready to unleash your inner hacker (for good, of course)!...

March 21, 2024 · 6 min · Tomi Mulhartono

Cracking the Code: My Experience with Malware Analysis at Protergo

During my technical interview at Protergo, I had the opportunity to showcase my skills in malware analysis. This blog post will take you through the exciting journey of dissecting a suspicious file using Cuckoo Sandbox, a powerful tool for both static and dynamic analysis. Step-by-Step Malware Analysis with Cuckoo Sandbox Step 1: Unpacking the Suspect After downloading the sample file, I unzipped it to reveal its contents. This initial step allows us to see what’s lurking inside the archive....

January 17, 2024 · 3 min · Tomi Mulhartono