Nisarg Suthar India India

@Nisarg - DFIR & CySec Aficionado.

Global Rank

322

Country Rank

20

Overall Progress

16.9%

19

Completed challenges

39600

Points

7

Writeups

-

Badges

Progress

Digital Forensics
32.8%
Threat Hunting
0.0%
Malware Analysis
16.0%
Threat Intel
72.6%

Accuracy

Digital Forensics
46.3%
Threat Hunting
0.0%
Malware Analysis
41.4%
Threat Intel
75.0%

Completed Labs: Certified CyberDefender Training and Certification Progress

Canary Tokens

Creating a decoy file using canary tokens and utilizing this effective tool to implant traps in production systems.

Rita

Rita settings, usage, and how to use it to detect DNS tunneling, beaconing traffic, and generate reports.

Velociraptor

Velociraptor deployment and interface, artifact collections, and the capture of a memory dump for an infected process.

OSSEC

Understanding OSSEC's architecture and configs, and utilizing it to detect web shells, persistence, and privilege escalation.

Email Security Controls

Explore email authentication mechanisms, specifically SPF, DKIM, and DMARC. Engage in hands-on exercises to configure and validate these mechanisms for email security.

Microsoft Sentinel SIEM

Querying stored logs, developing Sentinel workbooks, creating analytics, investigating an incident, and integrating threat intelligence feeds.

Nessus

Performing different types of scans and exporting a detailed report of the discovered vulnerabilities.

Suricata

Suricata settings, logs, analyzing a PCAP and matching it to signatures, detecting malicious traffic using Suricata as an IDS, and writing custom signatures.

Sysmon

Sysmon's configuration, EventTypes, and how to write a custom config and block executable files.

Completed Challenges: BlueYard Progress

challenge background image

Intel101

Medium | Threat Intel

challenge background image

GrabThePhisher

Easy | Threat Intel

challenge background image

GetPDF

Medium | Malware Analysis

challenge background image

LGDroid

Medium | Digital Forensics

challenge background image

Injector

Medium | Digital Forensics

challenge background image

Hunter

Medium | Digital Forensics

challenge background image

Hacked

Medium | Digital Forensics

challenge background image

BSidesJeddah-Part2

Medium | Digital Forensics

challenge background image

BSidesJeddah-Part1

Medium | Digital Forensics

challenge background image

Hammered

Medium | Digital Forensics

challenge background image

BankingTroubles

Difficult | Digital Forensics

challenge background image

MalDoc101

Medium | Malware Analysis

challenge background image

L'espion

Easy | Threat Intel

challenge background image

Exfiltrated

Medium | Digital Forensics

challenge background image

DeepDive

Difficult | Digital Forensics

challenge background image

Obfuscated

Medium | Malware Analysis

challenge background image

Phishy

Medium | Digital Forensics

challenge background image

Insider

Easy | Digital Forensics

challenge background image

DumpMe

Medium | Digital Forensics