Cybersecurity writing • CEH mindset • Evidence-first
Blog
Short, practical writeups based on how security is done in the real world: logs, endpoints, networks, incident readiness, and ISO documentation.
akhil@notes:~/blog
publish
$ ls -la
5 posts ready • recon • logs • edr • iso • wireshark
$ cat philosophy.txt
Evidence > assumptions. Validate > guess. Control > hope.
Posts
Writing | Madness
Nmap Recon Cheat Sheet (CEH-style)
Fast recon flows, safe scanning habits, and how to turn output into decisions.
Log Analysis Workflow: Alert → Evidence → Action
A practical triage method for endpoint, firewall, and identity logs.
EDR Implementation Checklist (70 endpoints)
Rollout plan, tuning basics, what to measure, and how to avoid noisy alerts.
ISO 27001 Documentation Pack (IT + Security)
What docs matter, how to structure evidence, and what auditors actually ask.
Wireshark: Spotting Suspicious Traffic Quickly
Filters and patterns that reveal scanning, beaconing, and credential abuse signs.