Charting My Cyber Security Path: A Collection of Courses and Certifications

Hey there! Welcome to my cyber security collection. If you’re here, you probably share a love for all things tech and security like I do. Over time, I’ve dived into various courses and earned certifications that have shaped my journey in cyber security. Below is a showcase of what I’ve accomplished so far, along with the skills I’ve picked up along the way. Why Cyber Security? Let’s face it—cyber threats aren’t going anywhere....

November 17, 2024 · 5 min · Tomi Mulhartono

Watch Cyber Attacks Unfold: Set Up T-Pot Honeypot on Google Cloud Platform

If you’re looking to explore security and dive into honeypot analysis, T-Pot is a fantastic tool that consolidates multiple honeypots into one robust platform. Today, I’ll guide you step-by-step through deploying T-Pot on Google Cloud Platform (GCP). By the end, you’ll have a fully operational T-Pot honeypot ready to capture and visualize attack data. What is T-Pot? T-Pot, developed by T-Mobile, is an all-in-one honeypot platform supporting over 20 honeypots. It includes features like animated attack maps, visualization through Elastic Stack, and a suite of tools for enhanced threat analysis....

November 17, 2024 · 3 min · Tomi Mulhartono

Getting Started with Your New Application on OpenResty Edge: An Easy-to-Follow Tutorial

Welcome aboard! If you’re gearing up to launch a new application on OpenResty Edge, you’re in the right place. Whether you’re a seasoned pro or just starting out, I’ll walk you through every step of the way with a dash of fun. Grab your favorite drink, settle in, and let’s dive into this setup adventure! What is OpenResty Edge? OpenResty Edge is a powerful platform designed to manage and deliver your applications at the edge, optimizing performance, scalability, and security....

September 6, 2024 · 5 min · Tomi Mulhartono

Stay Ahead of Issues: How to Connect Grafana Alerts with Slack and Jira Using n8n

So, you’re ready to up your game and make sure you never miss a critical update? Great choice! Setting up Grafana alerts and integrating them with Slack and Jira through n8n is a powerful way to keep your team on the ball. Let’s dive in and get those workflows automated! Setting Up Grafana Alerts First up, let’s get your Grafana alerts configured so you’re always in the know. Here’s the lowdown on how to get your alerts up and running:...

August 29, 2024 · 11 min · Tomi Mulhartono

Installing Gophish on Google Cloud Platform: A Step-by-Step Guide

If you’re looking for a simple, powerful, and free tool to simulate phishing attacks and train your team on cybersecurity, then Gophish is your go-to solution! This open-source phishing framework allows you to easily manage phishing campaigns, helping to improve security awareness without breaking the bank. What is Gophish? Gophish is a powerful open-source phishing framework designed to make the process of conducting and managing phishing campaigns as straightforward as possible....

July 19, 2024 · 4 min · Tomi Mulhartono

From Alerts to Malware: A CyberOps Associates v1.0 Skill Assessment Guide

Have you ever wondered what security analysts actually do? Buckle up, because we’re diving into a thrilling investigation of a malware attack! Today’s culprit? The notorious Pushdo trojan. This post will take you through a simulated security assessment, mimicking the thought process and steps involved in uncovering malicious activity. We’ll dissect alerts, explore the tools used for analysis, and ultimately expose the tricks employed by Pushdo. So, grab a cup of coffee (or your beverage of choice), and let’s embark on this malware takedown adventure!...

May 30, 2024 · 7 min · Tomi Mulhartono

Hack Like a Pro: A Beginner’s Guide to Vulnhub's Basic Pentesting 1

Have you ever wanted to test your penetration testing skills in a safe environment? Look no further than Vulnhub’s Basic Pentesting 1 machine! This virtual machine is designed specifically for beginners, offering a controlled space to learn the ropes of exploiting vulnerabilities and gaining access. In this guide, I’ll walk you through the thrilling journey of taking down Vulnhub’s Basic Pentesting 1, step-by-step. So, grab your tools and get ready to unleash your inner hacker (for good, of course)!...

March 21, 2024 · 6 min · Tomi Mulhartono

Cracking the Code: My Experience with Malware Analysis at Protergo

If you’re interested in malware analysis, using Cuckoo Sandbox is an exciting and safe way to dissect potentially malicious files. During my technical interview at Protergo, I had the opportunity to showcase my skills by analyzing a suspicious file. In this blog post, I’ll walk you through the process I followed using Cuckoo Sandbox, a powerful tool for both static and dynamic analysis. What is Cuckoo Sandbox? Cuckoo Sandbox is an open-source automated malware analysis system that allows you to analyze malware in an isolated environment....

January 17, 2024 · 4 min · Tomi Mulhartono