Posts

Image
Threat Hunting Windows Event Logs Introduction Event logs are a fantastic way to spot potential attacks on a Windows Machine and be able to explain what and how it occurred. However, not all event logs are useful, even if there are lot of them. It can be intimidating and requires good eyes to read through these logs. This blog will explain why some event logs are more useful than others and how to use them. Event log structure in windows The Windows event log captures hardware and software events that take place on a Windows operating system. It helps network administrators in keeping an eye out for threats and issues that could harm performance. Windows maintains event logs in a standardized format that makes it possible to understand the data. The following are an event log's primary components: ·        Log name: Name of the event log to which events from different logging components will be written. Events are commonly logged for system, security, and applications.

Introduction to OODA Loop

Image
A military combat offense necessitates quick decision-making, decisions that could mean life or death at any moment. This level of quick thinking and decision making is critical to gaining a competitive advantage on the battlefield and can even determine who ultimately wins. According to Art of war by Sun Tzu “Victorious warriors win first, and then go to war, while defeated warriors go to war first, and then seek to win”. It’s important to remember that success is typically the result of meticulous planning and effective implementation. Simply said, whether on the battlefield or in the marketplace, success is dependent on well-defined insights and strategies prior to taking action. As a result, we must begin to make better decisions in our lives. Allow me to introduce you to the OODA loop which is the method for making better decisions in 4 steps. History of OODA Loop The OODA (Observe, Orient, Decide, Act) loop was developed by Military strategist and US Air Force Colonel John Boyd i