PCAP Analysis Using tshark For Some Malware
1/2/2026 • 2 min readDabbling with light malware analysis. Starting with investigating the PCAP file
every post, newest first.
Dabbling with light malware analysis. Starting with investigating the PCAP file
Building a tiny Ubuntu ForensicsVM, locking down SSH, and wiring Syslog into Log Analytics with Azure Monitor Agent. Part 2 of my Azure lab series.
How I structured my personal Azure tenant, subscription, and roles to support both AZ-500 studying and a small forensics lab. Part 1
Why I turned an idle Raspberry Pi into a honeypot that ships to Azure Log Analytics, plus the tiny set of commands/aliases I’ll actually use.
Notes on how Azure (crime scene) and Colima/Docker (toolbox) fit together, plus a minimal cheat sheet for daily commands and setup patterns.
OpenPGP basics, why to encrypt reports and sign what you publish, and how to cleartext-sign your security.txt.
Practical notes on segmentation, VPNs, proxies, OSI/TCP/IP, and why they matter in SecOps.
what TLS-RPT is, why it matters, and the minimal steps to enable it.
How SMTP moves mail between servers and where it fits alongside IMAP/POP.
Secure SMTP delivery with strict TLS: what it is, why it exists, how to roll it out.
In-depth notes on email authentication, spoofing prevention, and policy configuration.