Skip to main content
kelvin kiplagat

kelvin kiplagat

The digital world is a battlefield of innovation and deception and every action shapes cybersecurity’s future. Fearless learners don’t wait.The curious solve threats like puzzles.The resilient turn failures into strength. Don’t just follow the path,create it. The future belongs to those who secure it.

Recent

OverTheWire: Bandit Walkthrough (Levels 0–34)
·1827 words·9 mins· loading · loading
CTF Writeups OverTheWire OverTheWire Bandit CTF Linux Beginner Walkthrough
OverTheWire Bandit Writeup (Level 0 to 15) # If you’re starting with cybersecurity, OverTheWire’s Bandit is a great place to learn.
TryHackMe: Billing Walkthrough
·802 words·4 mins· loading · loading
CTF Writeups TryHackMe TryHackMe CTF Billing Linux Enumeration Walkthrough
TryHackMe Billing Room Walkthrough Deep Dive into MagnusBilling Exploitation and Privilege Escalation # The TryHackMe “Billing” room is referred to as easy but it took me days to break through.
OhSINT Challenge Walkthrough: OSINT Investigation
·912 words·5 mins· loading · loading
Challenges Cybersecurity TryHackMe OSINT TryHackMe Cybersecurity ExifTool Burp Suite
#🕵️‍♂️ TryHackMe: OhSINT — My OSINT Investigation Walkthrough
DHCP Log Analysis Using Splunk
·1383 words·7 mins· loading · loading
SIEM Threat Hunting Splunk DHCP Logs Log Analysis Cybersecurity
Analyzing DHCP Log Files Using Splunk SIEM # Introduction # Dynamic Host Configuration Protocol (DHCP) log files contain valuable information about IP address assignments, lease durations, client requests, and server responses.
Detecting Suspicious DNS Queries in Splunk
·1521 words·8 mins· loading · loading
Cybersecurity Splunk Threat Hunting DNS Analysis Splunk SIEM Threat Intelligence DNS Tunneling
An analysis of long DNS queries in Splunk and potential risks like DNS tunneling.