hello friendi'm kris _
kris: security and hacking progress kris: I finished all the learning path on THM, took notes on a CCNA prep lecture series and did palo alto related studies coupled with cloud based technologies... kris: Finished the HTB starting point, hats off, well made content. kris: Started my journey in ICS. Listened to the SANS webcast from 2021, gave me some ideas about asset identification, segmentation and traffic control/monitoring and some free tools. kris: Went through CompTIA CySA+ CS0-002...theory only... kris: Started chewing through retired medium machines on HTB, starting from last year...gosh Notebook and Schooled took me a week...with help... kris: Started my world domination plan. kris: Started experimenting with Elasticsearch, Kibana, Logstash and Beats...Refreshed my blue teaming basics; events and process plus logging/auditing for windows and linux. kris: Have been struggling with HTB boxes and spent most of my time with ICS related stuff... kris: The OSCP prep begins today. kris: Gosh darn uncertainty...Prep postponed. kris: Found out about OccupyTheWeb! Spent half of the week with Elasticsearch and the other with ML. kris: Spent the week chewing through processes and policies... kris: Finished the Jr. Pentester learning path kris: Dipped my toes into Incident Response and Digital Forensics winhex, Autopsy, Volatility, ExIf tool, Wireshark and the beauty of FTK Image... kris: Finished the logstash/beats and kibana course...built a local ELK SIEM! kris: Finished the preparation for GICSP, SANS 410 and ICS summit here I come! kris: Pentesting smart contracts with tests, mythril and slither! Bug bounty here I come?... kris: Oh boy oh boy! Built my library of security standards, finished SANS 410 course, updated my to-do list! kris: Finished organizing my VMs and to-do lists, and did some SANS CTFs, getting back into DFIR kris: Created a bunch of DFIR scripts, wrote some grok patterns for unix logs and played around with ELK security kris: Dug myself into OpManager, incredible tool! kris: Refresher on all the blue teaming things. kris: Holiday hacking challenges galore! kris: Spent most of my time in the DFIR space lately!... kris: Finished advent of cyber! kris: Finished APIsec university! kris: Finished the DFIR learning path and got the Incident Responder badge on Let'sDefend! kris: Done with IEC62443 standard digestion... kris: Finally working on-site!!! Got intimate with SNORT, T3K, McAfee ePO and could flex my linux skill! kris: Dipping my toes into TPL tasks... kris: Getting deeper and deeper into ICS, iterating through SANS 410, IEC 62443 and some practice with cyber security FAT/SAT. kris: IEC62443, TPL/PM tasks, T3K Admin and Management training, preparation for Blue Team trainings, trouble shooting monitoring scripts... kris: THM Security Engineer path done, on to CyberDefenders cert. kris: Half-way done with the solidity security researcher course...bootcamp_ interrupt.exe kris: Finished the DevSecOps learning path, super fun! Halfway through Ethernauts and maybe one third of the way done with the planned Blockchain security plan! Busy, busy... kris: Finished AWS security and solution architect basics, now onto CISSP! kris: Been a while...Got through the CISSP book, also did SANS LDR516(Vulnerability Management), SEC530(Zero-trust for the Hybrid Enterprise) and SEC599(Defeating Advanced Adversaries) kris: By the end of 2025, the goal is to have GICSP ✅, GDSA✅, GDAT❌, CISSP❌. Than back at the technical courses.