<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Threathunting I: Network setup :: Forensic wheels</title><link>https://polymathmonkey.github.io/weblog/artifacts/threathuntingnet/index.html</link><description>Table of Contents Introduction Why I Built a Home Lab for Threat Hunting 🕵 Network Setup Topology, Hardware and Tools 🛠 Firewall configuration🧱 Switch configuration What I Learned Whats next Introduction This is a small series I wanted to start, where I write about my small threathunting setup and describe a little what I build and what I am doing with it.
In this part, I will describe the Network setup for my Environment, more about how I build the honeypots and the ELK Server I will describe in the follow up articles about threathunting.</description><generator>Hugo</generator><language>en-us</language><copyright>All text is licensed under a Creative Commons Attribution 4.0 International License.</copyright><lastBuildDate/><atom:link href="https://polymathmonkey.github.io/weblog/artifacts/threathuntingnet/index.xml" rel="self" type="application/rss+xml"/></channel></rss>