Local Tech Repair

Sunday, October 30, 2016

Splunk Extreme Search - xsCreateDDContext & xsWhere

Splunk has the ability to do some very impressive searches to help with statistical analysis. Some of those functions are not very well documented by Splunk's own internal documentation. I am going to go over a few commands and how they can be used.

Sunday, August 21, 2016

How to create notable events via correlation search/manually in Splunk

One of the main things that you can do with Splunk Enterprise Security is dealing around the Incident Review dashboard. You can customize this to be the most helpful to you when doing threat hunting. One of the ways is to automate your searches to create notable events automatically so that you don't have to continually look for them.

Sunday, April 3, 2016

Ethical Hacking Bookmarks

Since Null byte group had a user get their wonderful post down and things really don't disappear from the internet after they been up here is their bookmark post of wonderful links for ethical

Saturday, March 12, 2016

Protecting your Android device and your Privacy

Its been a while since I have written about how to protect your self from the prying eyes of government. So if your trying to protect your self against the NSA, GCHQ, or who ever here are some things that you can do to help protect yourself.

Saturday, October 17, 2015

Facebook Never deleted my account after years

So after over a year after deleting my #Facebook account and not signing into it.  My wife wanted me to get back on.  When I deleted my Facebook I went through all the trouble of doing it properly.

Wednesday, October 14, 2015

Using powershell to check if password is going to expire

Using powershell to create a script to check if the clients password is going to be expiring in the next 5 days.

Thursday, September 17, 2015

Information Security (InfoSec) Software, Books, and Resources

Security training and resources. I am creating this post mostly to help myself keep track of all the different infosec resources, applications, and study material for exams like Comptia Security+, CEH, CISSP, OSCP, and others. This is a resource for offensive security practices and tools. This list will be updated as time goes on.