<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
<channel>
  <title>AlanIssak - Blog</title>
  <link>https://alanissak.com</link>
  <description>Latest posts from AlanIssak - Blog</description>
  <language>en-us</language>
  <item><title>Attack Observation: Honeypot - First Breach Report</title><link>https://alanissak.com/post.php?slug=attack-observation-honeypot-first-breach-report</link><pubDate>Tue, 12 Aug 2025 00:00:00 -0700</pubDate><description># Attack Observation: Honeypot - First Breach Report This is my first-ever breach report, in which I discovered a potentially infected network belonging to a company that was running scans and breach...</description><guid isPermaLink="true">https://alanissak.com/post.php?slug=attack-observation-honeypot-first-breach-report</guid><author>Anthony Issakhanian</author><category>Cybersecurity</category></item><item><title>Attack Observation: First Honeypot Attack Observation</title><link>https://alanissak.com/post.php?slug=attack-observation-first-honeypot-attack-observation</link><pubDate>Thu, 24 Jul 2025 00:00:00 -0700</pubDate><description># Honeypot Attack Observation: First Attack Log First Attack Observation Write-up Assignment I created during my ISC Internship ## Attack Observation Disclaimer &gt; This post is based on a research...</description><guid isPermaLink="true">https://alanissak.com/post.php?slug=attack-observation-first-honeypot-attack-observation</guid><author>Anthony Issakhanian</author><category>Cybersecurity</category></item><item><title>Attack Observation: Rebuilding Malware and Commands</title><link>https://alanissak.com/post.php?slug=attack-observation-rebuilding-malware-and-commands</link><pubDate>Thu, 24 Jul 2025 00:00:00 -0700</pubDate><description># Attack Observation: Rebuilding Malware and Attacker’s Commands For this attack observation, I will break down the commands used by the threat actor and the process of rebuilding their malware. ##...</description><guid isPermaLink="true">https://alanissak.com/post.php?slug=attack-observation-rebuilding-malware-and-commands</guid><author>Anthony Issakhanian</author><category>Cybersecurity</category></item><item><title>DShield Cowrie Honeypot on Raspberry Pi</title><link>https://alanissak.com/post.php?slug=dshield-cowrie-raspberry-pi-honeypot</link><pubDate>Tue, 22 Jul 2025 00:00:00 -0700</pubDate><description># DShield Cowrie Honeypot on Raspberry Pi CM4 This post provides an overview of the DShield honeypot I set up during my internship with SANS ISC. A honeypot is a decoy system designed to attract...</description><guid isPermaLink="true">https://alanissak.com/post.php?slug=dshield-cowrie-raspberry-pi-honeypot</guid><author>Anthony Issakhanian</author><category>Cybersecurity</category></item>
</channel>
</rss>