<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CyberChef on Policy to Packets</title>
    <link>https://www.policytopackets.com/tags/cyberchef/</link>
    <description>Recent content in CyberChef on Policy to Packets</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>reedveggleston@gmail.com (Reed Eggleston)</managingEditor>
    <webMaster>reedveggleston@gmail.com (Reed Eggleston)</webMaster>
    <copyright>© 2026 Reed Eggleston</copyright>
    <lastBuildDate>Mon, 23 Feb 2026 11:41:00 +0000</lastBuildDate><atom:link href="https://www.policytopackets.com/tags/cyberchef/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Http Basic Auth.</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/http_basic_auth./</link>
      <pubDate>Mon, 23 Feb 2026 11:41:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/http_basic_auth./</guid>
      <description>Analyzing a PCAP file to identify HTTP GET requests, enumerate server and client details from HTTP headers, and decode Basic Authentication credentials using Wireshark and CyberChef.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend EventID: 115 - [SOC165 - Possible SQL Injection Payload Detected]</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/soc/165_115/</link>
      <pubDate>Sat, 21 Feb 2026 18:15:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/soc/165_115/</guid>
      <description>Investigating a SQL injection alert after repeated crafted payloads targeted a web server, decoding and validating the requests through log analysis, reviewing source IP reputation across multiple threat intelligence sources, and confirming the attack was unsuccessful based on server responses and endpoint verification.</description>
      
    </item>
    
  </channel>
</rss>
