Samuel Adeduntan

Samuel Adeduntan @samueladeduntan

About: Detail-oriented junior security specialist with 2+ years of experience in security analytics, incident response, and threat detection. Proficient in SIEM platforms (Splunk), vulnerability assessment

Location:
Ibadan, Nigeria
Joined:
Mar 7, 2025

Samuel Adeduntan
articles - 31 total

#DAY 12: My Project Summary & Learning Journey.

Project Summary: 12-Day Uptime Kuma Monitoring Deployment Introduction Over the course of...

Learn More 6 0Oct 6 '25

#DAY 11: High Availability – Deploying a Reverse Proxy (Nginx)

Enhancing Security and Reliability with Nginx Introduction Securing and simplifying...

Learn More 6 0Oct 5 '25

#DAY 10:Adding an API JSON Query Monitor in Uptime Kuma

Validating API Health & Content Introduction Applications may react, but...

Learn More 1 0Oct 4 '25

#DAY 8 & 9: Cross-Platform Monitoring - Adding a Windows Host

Integrating Windows into a Unified Monitoring Framework Introduction Operating...

Learn More 0 0Oct 3 '25

#DAY 7: The First Fire Drill: Incident Simulation

Testing Readiness Through Simulated Outages Introduction The effectiveness of a...

Learn More 0 0Oct 2 '25

#DAY 6 - Organization & Public Status Page

Staying Ahead with Real-Time Notifications Introduction Transparency and...

Learn More 0 0Oct 1 '25

#DAY 5 - Getting Proactive: Telegram Alert Configuration

Bringing Monitoring to Your Fingertips Introduction When problems are...

Learn More 1 0Sep 30 '25

#DAY 4 - Expanding My Monitoring Scope: External & Advanced Checks

Building a Holistic Monitoring Strategy Introduction Concentrating just on...

Learn More 1 0Sep 29 '25

#DAY 3 - Monitoring Internal Services: FTP & SSH

Ensuring Secure Access and Data Transfer Introduction It is crucial to monitor...

Learn More 1 0Sep 28 '25

#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

Setting Up and Running Uptime Kuma for Real-Time Service Monitoring On Ubuntu Server ...

Learn More 1 0Sep 27 '25

#DAY 1: Docker & Core Concepts

Building a Solid Understanding of Containers, Images, and the Docker...

Learn More 2 0Sep 26 '25

#Pre-DAY 1: Laying the Foundation: Docker & Concepts

Infrastructure Monitoring in 12 Days: A Hands-On Journey with Uptime Kuma A practical...

Learn More 1 0Sep 25 '25

#DAY 9: Accelerating Analysis with Splunkbase

Deploying a Windows Logon Monitoring Dashboard Introduction On day nine, the emphasis was...

Learn More 1 0Sep 15 '25

#DAY 8: Guardian of the Filesystem

Implementing File Integrity Monitoring (FIM) with Splunk Introduction Using File Integrity...

Learn More 1 0Sep 14 '25

#DAY 7: From Data to Detection

Querying Windows Events and Hunting for Brute Force Attacks Introduction Turning raw event...

Learn More 1 0Sep 13 '25

#DAY 6: Closing the On-Prem Loop

Setting up the Enterprise Server's Universal Forwarder Introduction On the sixth day, the...

Learn More 1 0Sep 12 '25

#DAY 5: Configuring the Data Pipeline

Preparing Splunk Enterprise to Receive Data Introduction Configuring Splunk Enterprise to...

Learn More 1 0Sep 11 '25

#DAY 4: The Field Agent

Deploying the Universal Forwarder & Establishing a Secure Connection Intoduction Day 4...

Learn More 3 0Sep 10 '25

#DAY 3: The Cloud Brain

Integrating Splunk Cloud and Onboarding Data Introduction On the third day, the lab was...

Learn More 1 0Sep 9 '25

#DAY 2: From Installation to Operational Verification

Confirming a Successful Splunk Installation & Running the First Search. Verifying the...

Learn More 1 0Sep 8 '25

#DAY 1: DFIR Lab Setup

How I prepared my toolkit and mindset for a week-long SOC and Digital Forensics...

Learn More 5 0Sep 5 '25

A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

Introduction I recently conducted a thorough study of a sophisticated assault campaign...

Learn More 1 2Aug 29 '25

Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

Introduction As part of my ongoing exploration of application security, I undertook a...

Learn More 1 0Aug 29 '25

A Personal Journey: Understanding Reflected XSS Through My DVWA Setup

My Overview of Web Application Security Sharing my own experience of finding and...

Learn More 1 0Aug 28 '25

A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

The goal is to find, exploit, and extract database information through SQL Injection (SQLi)...

Learn More 1 1Aug 28 '25

Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

Introduction In my recent hands-on work, I implemented File Integrity Monitoring (FIM) on...

Learn More 1 2Aug 28 '25

File Integrity Monitoring with Wazuh SIEM Tool

Overview One of the most critical security requirements in the current threat landscape is...

Learn More 2 0Aug 28 '25

The Art of Recon: What Happens When a Target Only Has One Door?

1. Introduction: The Importance of Reconnaissance A penetration tester must respond to the...

Learn More 0 0Aug 22 '25

From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

1. Introduction & Target Overview Targeted in this engagement was a web application...

Learn More 0 0Aug 21 '25

Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough

A Comprehensive Guide to SIEM Configuration Setting up a Security Information and Event...

Learn More 3 0Aug 21 '25