SecByArafai

Blog

Building My Cybersecurity Home Lab

How I set up my first lab using Kali, Ubuntu, and Metasploitable.

Snort IDS Lab Explained

How I created detection rules and tested attacks.

Malware Traffic Analysis with Wireshark

How I analysed malware safely using Wireshark.