September 6, 2025
SSLVPN Honeypots: Fortigate Findings & Musings
Examining patterns observed in operating and collecting data from an SSLVPN honeypot sitting behind a Finch proxy.
I am Mike (Rem). This is where I publish field notes, technical write-ups, and lessons learned from hands-on security work.
Case-driven write-ups from incident response and malware triage work.
Practical detection content across YARA, Sigma, and telemetry-first workflows.
Supply-chain abuse, protocol behavior, and CTF-style problem solving.
September 6, 2025
Examining patterns observed in operating and collecting data from an SSLVPN honeypot sitting behind a Finch proxy.
May 17, 2025
Ransomware affiliates have long since abused Cloudflared tunnels to maintain persistent access to compromised environments. These tunnels can be utilized as a strong indicator of compromise when examined at-scale.
October 5, 2024
A continually evolving knowledgebase of things I've found pertinent as a threat and security operations analyst, specifically focusing on malware analysis.
June 26, 2024
Chainsaw's hunt feature, along with Chainsaw's rule engine, is an excellent way to hunt for evil at scale and create reusable, maintainable queries for rapid triage. We will apply this to both simulated red team engagements and real world compromises to detect lateral movement, Impacket, and even ASP.NET compromises.