<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security_Analyst on Policy to Packets</title>
    <link>https://www.policytopackets.com/tags/security_analyst/</link>
    <description>Recent content in Security_Analyst on Policy to Packets</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>reedveggleston@gmail.com (Reed Eggleston)</managingEditor>
    <webMaster>reedveggleston@gmail.com (Reed Eggleston)</webMaster>
    <copyright>© 2026 Reed Eggleston</copyright>
    <lastBuildDate>Mon, 23 Feb 2026 15:48:00 +0000</lastBuildDate><atom:link href="https://www.policytopackets.com/tags/security_analyst/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Disclose The Agent</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/disclose_the_agent/</link>
      <pubDate>Mon, 23 Feb 2026 15:48:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/disclose_the_agent/</guid>
      <description>Analyzing an SMTP PCAP to identify leaked credentials, decode Base64 authentication data, extract and reconstruct an email attachment from network traffic, and verify file integrity through hashing.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Investigate Web Attack</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/investigate_web_attack/</link>
      <pubDate>Mon, 23 Feb 2026 12:14:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/investigate_web_attack/</guid>
      <description>Analyzing raw Apache access logs with Bash tools to identify reconnaissance with Nikto, forced browsing, successful login brute force activity, and command injection leading to account creation on the target system.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Http Basic Auth.</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/http_basic_auth./</link>
      <pubDate>Mon, 23 Feb 2026 11:41:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/http_basic_auth./</guid>
      <description>Analyzing a PCAP file to identify HTTP GET requests, enumerate server and client details from HTTP headers, and decode Basic Authentication credentials using Wireshark and CyberChef.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Phishing Email</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/phishing_email/</link>
      <pubDate>Fri, 20 Feb 2026 17:45:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/phishing_email/</guid>
      <description>Analyzing a suspicious PayPal-themed email by reviewing headers, identifying a deceptive return path, extracting a URL hosted on a trusted platform, validating domain reputation, and confirming phishing activity leveraging living-off-trusted-sites techniques.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Shellshock Attack</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/shellshock_attack/</link>
      <pubDate>Sat, 14 Feb 2026 22:48:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/shellshock_attack/</guid>
      <description>Analyzing Shellshock attack activity in a PCAP file using Wireshark, identifying the target server details and the injected command.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Port Scan Activity</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/port_scan_activity/</link>
      <pubDate>Sat, 14 Feb 2026 22:10:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/port_scan_activity/</guid>
      <description>Analyzing port scan activity in a PCAP file using Wireshark, identifying the scanning host, discovered systems, and network indicators.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - MSHTML</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/mshtml/</link>
      <pubDate>Sat, 14 Feb 2026 21:07:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/mshtml/</guid>
      <description>Analyzing malicious Office documents exploiting MSHTML (CVE-2021-40444), using oletools to extract indicators, identify malicious domains and IPs, and investigate document-based exploitation.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Excel 4.0 Macros</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/excel_4.0_macros/</link>
      <pubDate>Sat, 14 Feb 2026 00:39:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/excel_4.0_macros/</guid>
      <description>Analyzing a malicious Excel 4.0 (XLM) macro document using XLMMacroDeobfuscator and oletools to identify process execution, regsvr32 abuse, and DLL payload behavior.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Malicious Doc</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/malicious_doc/</link>
      <pubDate>Sat, 14 Feb 2026 00:15:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/malicious_doc/</guid>
      <description>Analyzing a malicious Word document using VirusTotal to identify RTF exploit behavior, CVE-2017-11882 abuse, payload delivery, and network communication.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Remote Working</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/remote_working/</link>
      <pubDate>Fri, 13 Feb 2026 23:08:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/remote_working/</guid>
      <description>Analyzing a malicious XLS file using VirusTotal to identify detection signatures, dropped files, spyware download URLs, and file intelligence indicators.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Malicious VBA</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/malicious_vba/</link>
      <pubDate>Fri, 13 Feb 2026 16:41:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/malicious_vba/</guid>
      <description>Analyzing a malicious VBA macro document, decoding obfuscated hex strings, identifying payload delivery, and investigating HTTP communication and WMI execution techniques.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Learn Sigma</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/learn_sigma/</link>
      <pubDate>Fri, 13 Feb 2026 14:08:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/learn_sigma/</guid>
      <description>Analyzing a Sigma rule for detecting bitsadmin.exe abuse, explaining rule structure, detection logic, and ransomware-related process_creation monitoring.</description>
      
    </item>
    
  </channel>
</rss>
