<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://josephelbert.github.io/</id><title>Joseph Elbert</title><subtitle>josephelbert.github.io personal cybersecurity focused blog</subtitle> <updated>2026-04-03T20:10:32+00:00</updated> <author> <name>Joseph Elbert</name> <uri>https://josephelbert.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://josephelbert.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://josephelbert.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Joseph Elbert </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Hunting an APT with Splunk: Initial Access (BOTS v2)</title><link href="https://josephelbert.github.io/posts/bots-v2-apt-initial-access/" rel="alternate" type="text/html" title="Hunting an APT with Splunk: Initial Access (BOTS v2)" /><published>2026-04-03T00:00:00+00:00</published> <updated>2026-04-03T00:00:00+00:00</updated> <id>https://josephelbert.github.io/posts/bots-v2-apt-initial-access/</id> <content type="text/html" src="https://josephelbert.github.io/posts/bots-v2-apt-initial-access/" /> <author> <name>Joseph Elbert</name> </author> <category term="Splunk" /> <category term="BOTSv2" /> <summary>Two hypothesis-driven threat hunts against the Splunk BOTS v2 dataset tracing a spearphishing campaign from email delivery through malicious file execution, uncovering a two-wave attack that evaded detection on the second attempt.</summary> </entry> <entry><title>Hunting an APT with Splunk: Reconnaissance (BOTS v2)</title><link href="https://josephelbert.github.io/posts/bots-v2-apt-reconnaissance/" rel="alternate" type="text/html" title="Hunting an APT with Splunk: Reconnaissance (BOTS v2)" /><published>2026-04-02T00:00:00+00:00</published> <updated>2026-04-03T20:09:58+00:00</updated> <id>https://josephelbert.github.io/posts/bots-v2-apt-reconnaissance/</id> <content type="text/html" src="https://josephelbert.github.io/posts/bots-v2-apt-reconnaissance/" /> <author> <name>Joseph Elbert</name> </author> <category term="Splunk" /> <category term="BOTSv2" /> <summary>A walkthrough of two hypothesis-driven threat hunts against the Splunk BOTS v2 dataset, uncovering North Korean reconnaissance activity against a fictional brewing company using user agent string analysis and open-source intelligence.</summary> </entry> <entry><title>CyberDefenders: AzurePot Lab</title><link href="https://josephelbert.github.io/posts/cyberdefenders-azurepot-lab/" rel="alternate" type="text/html" title="CyberDefenders: AzurePot Lab" /><published>2026-01-26T00:00:00+00:00</published> <updated>2026-04-03T00:47:05+00:00</updated> <id>https://josephelbert.github.io/posts/cyberdefenders-azurepot-lab/</id> <content type="text/html" src="https://josephelbert.github.io/posts/cyberdefenders-azurepot-lab/" /> <author> <name>Joseph Elbert</name> </author> <category term="CyberDefenders" /> <category term="Endpoint Forensics" /> <summary>CyberDefenders: AzurePot Lab Overview In this lab, I will analyze a compromised Ubuntu Linux honeypot that was deployed on Microsoft Azure in October 2021. The honeypot was specifically designed to attract attackers exploiting CVE-2021-41773, a critical vulnerability in Apache HTTP Server that allows for path traversal and remote code execution (RCE). This vulnerability was actively targeted ...</summary> </entry> <entry><title>CyberDefenders: BlueSky Lab</title><link href="https://josephelbert.github.io/posts/cyberdefenders-bluesky-lab/" rel="alternate" type="text/html" title="CyberDefenders: BlueSky Lab" /><published>2026-01-25T00:00:00+00:00</published> <updated>2026-03-10T04:55:36+00:00</updated> <id>https://josephelbert.github.io/posts/cyberdefenders-bluesky-lab/</id> <content type="text/html" src="https://josephelbert.github.io/posts/cyberdefenders-bluesky-lab/" /> <author> <name>Joseph Elbert</name> </author> <category term="CyberDefenders" /> <category term="Network Forensics" /> <summary>CyberDefenders: BlueSky Lab Overview This lab walkthrough provides an in-depth investigation into a ransomware attack leveraging the BlueSky ransomware family. The exercise is designed to help cybersecurity analysts identify and analyze various stages of a sophisticated attack, from initial compromise to credential dumping, lateral movement, and ransomware deployment. By examining network tra...</summary> </entry> <entry><title>CyberDefenders: LGDroid Lab</title><link href="https://josephelbert.github.io/posts/cyberdefenders-lgdroid-lab/" rel="alternate" type="text/html" title="CyberDefenders: LGDroid Lab" /><published>2025-12-07T00:00:00+00:00</published> <updated>2026-03-10T04:55:36+00:00</updated> <id>https://josephelbert.github.io/posts/cyberdefenders-lgdroid-lab/</id> <content type="text/html" src="https://josephelbert.github.io/posts/cyberdefenders-lgdroid-lab/" /> <author> <name>Joseph Elbert</name> </author> <category term="CyberDefenders" /> <category term="Endpoint Forensics" /> <summary>CyberDefenders: LGDroid Lab Overview The LGDroid Lab challenges you to step into the role of a SOC analyst tasked with investigating a disk dump from an Android mobile device. This scenario simulates a real-world forensic investigation, requiring a deep dive into the data to extract critical insights. By analyzing various artifacts such as SQLite databases, log files, application data, and mu...</summary> </entry> </feed>
