<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Wazuh on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/wazuh/</link><description>Recent content in Wazuh on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Mon, 09 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/wazuh/index.xml" rel="self" type="application/rss+xml"/><item><title>Wazuh + Suricata: injection detection</title><link>https://hexpysya.github.io/blue_team/wazuh-injection/</link><pubDate>Mon, 09 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/wazuh-injection/</guid><description>Detected a SQL Injection attack, observed 85 alerts across 6 rule IDs, and configured automated IP blocking via active response.</description></item><item><title>Wazuh + Suricata: Malware traffic</title><link>https://hexpysya.github.io/blue_team/wazuh+suricata-malware-traffic/</link><pubDate>Mon, 02 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/wazuh+suricata-malware-traffic/</guid><description>Replayed a malicious PCAP file containing Hancitor dropper traffic that deployed Cobalt Strike, Dridex, and Ficker Stealer. Analyzed 423 Suricata alerts in Wazuh, reconstructed the full infection chain, and mapped findings to MITRE ATT&amp;amp;CK.</description></item><item><title>Wazuh: SSH Brute Force</title><link>https://hexpysya.github.io/blue_team/wazuh_ssh-brute-force/</link><pubDate>Fri, 20 Feb 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/wazuh_ssh-brute-force/</guid><description>Simulated an SSH brute force attack using Hydra, observed Wazuh detection across 7 rule IDs, identified a gap in default alerting (max level 10), wrote a custom rule to escalate severity to level 12, and configured automated IP blocking via active response.</description></item></channel></rss>