From Threat Intel to Splunk Evidence: Validating Dirty Frag in an AWS Homelab
A defensive Splunk case study translating two Dirty Frag Linux kernel CVEs into a safe AWS homelab validation workflow, using Ubuntu telemetry, module-state checks, mitigation evidence, and dashboards to prove before-and-after host state.
Designing and Validating a Distributed Splunk Enterprise Homelab in AWS
A practical case study in building a distributed Splunk Enterprise environment in AWS, with a focus on Ubuntu host preparation, clustered indexing, secure forwarding paths, and platform validation before onboarding security telemetry.