top of page
Home
Services
Penetration Testing
Vulnerability Assessments
Red Team Assessment
Purple Team Assessment
Digital Forensics
Incident Response
Threat Hunting
Source Code Assessment
Social Engineering Assessment
CISO Consulting
Governance, Risk Management & Compliance
Cybersecurity Readiness Assessment
Cybersecurity Retainer
Contact
About
Training
Blog
More
Use tab to navigate through the menu items.
Contact Us
Profile
Join date: Oct 25, 2023
Posts
(1)
Oct 26, 2023
∙
12 min
How to Build Your Own DNS Sinkhole and DNS Logs Monitoring System
Pi-hole logs each DNS event, including domain resolutions and blocks. DNS logs are a gold mine that is often overlooked by network defenders
700
0
Ronny Thammasathiti & James Kelly
Writer
0
Followers
0
Following
Cybersecurity Consultants
Follow
Following icon
More actions
Profile
More
Use tab to navigate through the menu items.
bottom of page