With this article I intend to help you all to understand not only the importance of the CIS Critical Security Control: Inventory of authorized and unauthorized software, but also the importance of automation. Trust me, automation makes the job easy. But, to do so I want to share my own experience and how I ended... Continue Reading →
Setting up Cuckoo 2.0.5 – Part II
This is my second article on the cuckoo sandbox series. The previous one focused on setting up the host machine and from here on out we will be focusing on the guest machine. Preparing the Virtual Machine Now that we are done with the host machine, we will start preparing the virtual machine, starting with... Continue Reading →
Setting up Cuckoo 2.0.5 – Part I
This is a comprehensive, step by step documentation of the procedure that I followed for installing the latest version of cuckoo, i.e. 2.0.5. This was part of a bigger project I was working on during my master's education. Your feedback on how to improve or any corrections related to my cuckoo setup would be greatly... Continue Reading →
Hell0 W0rld
Welcome to SecureSeed. I will be posting out articles on the things I learn in the cyberspace and in return help you learn as well. Not necessarily security articles all the time, but other experiences, scripts, tools I come across will also be posted here. What this blog is "not" about: OR Maybe... Continue Reading →