<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Automation on Shadow Engineering</title>
    <link>https://shadow.engineering/tags/automation/</link>
    <description>Recent content in Automation on Shadow Engineering</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 </copyright>
    <lastBuildDate>Sat, 03 Dec 2022 02:49:03 +0000</lastBuildDate><atom:link href="https://shadow.engineering/tags/automation/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Jupyter Notebooks and Pandas for Security Analysis</title>
      <link>https://shadow.engineering/posts/security_analytics_with_pandas/</link>
      <pubDate>Sat, 03 Dec 2022 02:49:03 +0000</pubDate>
      
      <guid>https://shadow.engineering/posts/security_analytics_with_pandas/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;Jupyter Notebooks&#xA;    &lt;div id=&#34;jupyter-notebooks&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;&#xA;    &#xA;    &lt;span&#xA;        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none&#34;&gt;&#xA;        &lt;a class=&#34;text-primary-300 dark:text-neutral-700 !no-underline&#34; href=&#34;#jupyter-notebooks&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;&#xA;    &lt;/span&gt;&#xA;    &#xA;&lt;/h2&gt;&#xA;&lt;p&gt;Jupyter Notebooks are an interactive way to run python commands alongside documenting with rich text. This means we can methodically execute code, track actions undertaken, and recreate events. While the original intent was mainly directed at data scientists, as you can imagine, this is pretty appealing to security analysts.&lt;/p&gt;&#xA;&lt;p&gt;It doesn&amp;rsquo;t matter whether you&amp;rsquo;re a threat hunter, or a forensic analysis - collecting artefacts from multiple sources, and correlating them is a pretty common process. Jupyter notebooks allow us to do this, record the results and potentially manipulate our data to extrapolate additional information.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Chaos Analyst</title>
      <link>https://shadow.engineering/posts/chaos_analyst/</link>
      <pubDate>Sat, 01 Feb 2020 00:00:00 +1000</pubDate>
      
      <guid>https://shadow.engineering/posts/chaos_analyst/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;Abstract&#xA;    &lt;div id=&#34;abstract&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;&#xA;    &#xA;    &lt;span&#xA;        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none&#34;&gt;&#xA;        &lt;a class=&#34;text-primary-300 dark:text-neutral-700 !no-underline&#34; href=&#34;#abstract&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;&#xA;    &lt;/span&gt;&#xA;    &#xA;&lt;/h2&gt;&#xA;&lt;p&gt;As organisations look to new methodologies to increase, test, and verify resiliency of infrastructure and applications,&#xA;so can SOCs look to new methodologies to validate integrity of logging, tools, platforms, analysis and re-enforce forensic&#xA;tradecraft, as they incorporate automation tools into their arsenals. Chaos Analyst is a new methodology for SOCs which&#xA;looks at implementing scenarios that force analysts to overcome obstacles that impact their ability to address alerts, or&#xA;in more advanced scenarios, validate potentially compromised logs and data. This can be incorporated into red team&#xA;activity to mimic more sophisticated attackers and manipulation, improving the ability of response, the tradecraft and&#xA;preparedness of the SOC in detecting and preventing actors from compromising all elements of the business.&lt;/p&gt;</description>
      
    </item>
    
  </channel>
</rss>
