Joe Lopes

Joe Lopes

Infosec Engineer. Logs of my cyber yamadori.
cover

Countdown to Zero Day

Stuxnet and the launch of the world's first digital weapon.

· 7min · Joe Lopes
Countdown to Zero Day
cover

Project Nebula: Debriefing

Final thoughts and improvements for the Nebula detection lab.

· 7min · Joe Lopes
Project Nebula: Debriefing
cover

Project Nebula: Detecting with Elastic

Elastic Stack deployment for log monitoring.

· 13min · Joe Lopes
Project Nebula: Detecting with Elastic
cover

Project Nebula: Detecting with Wazuh

Setting up Wazuh for log collection and detection rules.

· 9min · Joe Lopes
Project Nebula: Detecting with Wazuh
cover

Project Nebula: Build a Simple Detection Lab

Easy guide to setting up a simple detection engineering lab.

· 7min · Joe Lopes
Project Nebula: Build a Simple Detection Lab
cover

Practical Threat Detection Engineering

Review of Practical Threat Detection Engineering book.

· 5min · Joe Lopes
Practical Threat Detection Engineering
cover

Auto-Cleaning Lists in Chronicle SIEM

Automate Chronicle SIEM list cleanup for expired items.

· 9min · Joe Lopes
Auto-Cleaning Lists in Chronicle SIEM
cover

Endpoint Security Reflections feat. EDR

Comparing EDR with alternative endpoint solutions.

· 8min · Joe Lopes
Endpoint Security Reflections feat. EDR
cover

Integrating MISP with Chronicle SIEM

Integrate CTI and CSIRT automatically and efficiently.

· 15min · Joe Lopes
Integrating MISP with Chronicle SIEM
cover

Debunking Threat Detection Myths

Debunking threat detection myths for improved SecOps.

· 4min · Joe Lopes
Debunking Threat Detection Myths
cover

How to Sign Commits in Git(Hub)

Use cryptography to secure Git commits and boost reliability.

· 4min · Joe Lopes
How to Sign Commits in Git(Hub)
cover

Portfolio Tracker v4

Version 4 of my portfolio tracker spreadsheet.

· 7min · Joe Lopes
Portfolio Tracker v4
cover

Improving SecOps Beyond Tuning Analytics

· 5min · Joe Lopes
Improving SecOps Beyond Tuning Analytics
cover

The Cuckoo's Egg

A 1980s Infosec thriller with groundbreaking investigations.

· 6min · Joe Lopes
The Cuckoo's Egg
cover

The Threat Detection Fundamental Dilemma

Exploring the precision vs. recall dilemma in threat detection.

· 8min · Joe Lopes
The Threat Detection Fundamental Dilemma
cover

A Little Hardening with Burp

How I used Burp to improve this blog's security.

· 3min · Joe Lopes
A Little Hardening with Burp
cover

MITRE ATT&CK 101: Bridging the Gap

Guide to MITRE ATT&CK with history and context for better usage.

· 10min · Joe Lopes
MITRE ATT&CK 101: Bridging the Gap
cover

Testing The Logfile Navigator

Log analysis with lnav: challenges, insights, and tips.

· 6min · Joe Lopes
Testing The Logfile Navigator
cover

Getting Real About MITRE ATT&CK

Understanding MITRE ATT&CK and using it in your favor.

· 4min · Joe Lopes
Getting Real About MITRE ATT&CK
cover

Insights into Effective SIEM Deployment

Strategies and tips for successful SIEM deployment.

· 8min · Joe Lopes
Insights into Effective SIEM Deployment
cover

Mastering your Performance

Tools, rituals, and reflections for growth in Infosec.

· 11min · Joe Lopes
Mastering your Performance
cover

Understanding Severity and Priority

Find the best settings for consistent detection alerts.

· 3min · Joe Lopes
Understanding Severity and Priority
cover

Productivity Unleashed

Boost productivity with tools and a streamlined process.

· 7min · Joe Lopes
Productivity Unleashed
cover

Intelligence-Driven Incident Response

How integrating CTI enhances Threat Detection and CSIRT.

· 4min · Joe Lopes
Intelligence-Driven Incident Response
cover

Chronicle SIEM: Insights and Challenges Explored

Chronicle features and challenges in Threat Detection.

· 12min · Joe Lopes
Chronicle SIEM: Insights and Challenges Explored
cover

Portfolio Tracker: Mastering your Finances

Better portfolio management with this powerful spreadsheet.

· 17min · Joe Lopes
Portfolio Tracker: Mastering your Finances
cover

Handling Floating Point Precision in Spreadsheets

Handling floating point precision in spreadsheets effectively.

· 3min · Joe Lopes
Handling Floating Point Precision in Spreadsheets
cover

Effective Detection Rules for Net and Port Scans

Effective network and port scan detection.

· 7min · Joe Lopes
Effective Detection Rules for Net and Port Scans
cover

Hardening Email with DKIM, SPF, DMARC

Learn how to protect your mailboxes from cyber threats.

· 5min · Joe Lopes
Hardening Email with DKIM, SPF, DMARC
cover

Using GPT-3.5 for SEO Advice

Using OpenAI's GPT-3 to generate SEO-friendly post metadata.

· 8min · Joe Lopes
Using GPT-3.5 for SEO Advice
cover

Export and Decode GAuth 2FA Accounts

How to export and decode GAuth 2FA.

· 3min · Joe Lopes
Export and Decode GAuth 2FA Accounts
cover

Using AWS Secrets Manager in Your Scripts

Learn to authenticate in tools seamlessly.

· 4min · Joe Lopes
Using AWS Secrets Manager in Your Scripts
cover

Getting Started with CloudFlare for Web Protection

Use CloudFlare’s free plan for better site security.

· 4min · Joe Lopes
Getting Started with CloudFlare for Web Protection
cover

Updating Signed Documents with GPG

Update GPG signed docs: import keys, patch files in batch.

· 4min · Joe Lopes
Updating Signed Documents with GPG
cover

Getting Cryptocurrency Prices in Google Sheets

Retrieve crypto prices in Sheets using a 3rd party service.

· 4min · Joe Lopes
Getting Cryptocurrency Prices in Google Sheets
cover

Automating Incident Response

Tackling log centralization, SIEM, and IR automation.

· 9min · Joe Lopes
Automating Incident Response
cover

The Importance of Logging Strategy

Streamlined planning and retention practices for better logging.

· 5min · Joe Lopes
The Importance of Logging Strategy
cover

Friction Between Red Teams and Incident Response

Reducing friction in Red Team cybersecurity exercises.

· 7min · Joe Lopes
Friction Between Red Teams and Incident Response
cover

My Minimalistic Approach to Mac System Setup

Set up your Mac with fewer apps for a simpler system.

· 4min · Joe Lopes
My Minimalistic Approach to Mac System Setup
cover

Query Security Services for IP Reputation

Query three security services for IP reputation in one script.

· 4min · Joe Lopes
Query Security Services for IP Reputation
cover

Changing the Zola Theme

How to change your Zola blog theme without breaking the site.

· 6min · Joe Lopes
Changing the Zola Theme
cover

Creating a Hardened Testing Environment

Install and secure Arch Linux for safer network tests.

· 3min · Joe Lopes
Creating a Hardened Testing Environment
cover

Set Static IP Address in Arch Linux

Set a static IP in Arch Linux without DHCP support.

· 3min · Joe Lopes
Set Static IP Address in Arch Linux
cover

Recovering Arch Linux from a PAM Issue

How to recover Arch with a misconfigured PAM configuration.

· 4min · Joe Lopes
Recovering Arch Linux from a PAM Issue
cover

Secure and Easy Password and MFA Management

Enhance passwords and MFA for better security and usability.

· 10min · Joe Lopes
Secure and Easy Password and MFA Management
cover

Calculating and Decomposing Syslog Priority

Calculate and decompose Syslog message priority.

· 2min · Joe Lopes
Calculating and Decomposing Syslog Priority
cover

Real-time Log Forwarding with Python and Syslog

Create a smart log forwarding script using Python and Syslog.

· 3min · Joe Lopes
Real-time Log Forwarding with Python and Syslog
cover

AWS Certified Security - Specialty Review

The materials and strategy I used to get this certification.

· 4min · Joe Lopes
AWS Certified Security - Specialty Review
cover

Logging Python Messages to Syslog in macOS

Send log messages from Python to Syslog in macOS.

· 1min · Joe Lopes
Logging Python Messages to Syslog in macOS
cover

My Journey to CISSP Certification

My experience getting the CISSP certification.

· 17min · Joe Lopes
My Journey to CISSP Certification