<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//favogab.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://favogab.com/</loc>
		<lastmod>2026-03-31T08:53:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://favogab.com/web-development/wordpress-6-9-footer-bug-fix/</loc>
		<lastmod>2026-03-31T08:53:02+00:00</lastmod>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2025/09/Wordpress-Bug-fix.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://favogab.com/cybermap/the-human-firewall-begins-at-orientation/</loc>
		<lastmod>2026-03-31T08:52:44+00:00</lastmod>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2025/12/should-security-training-start-on-day-one.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://favogab.com/cybermap/soc-mindset-wordpress-security-2026/</loc>
		<lastmod>2026-03-31T08:52:08+00:00</lastmod>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2025/09/favogab-from-pixels-to-packets.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://favogab.com/cybermap/legacy-websites-are-a-security-risk/</loc>
		<lastmod>2026-03-31T08:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/02/security-risk-access-control-attack-surface-reduction.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://favogab.com/lab/network-traffic-proves-packets-dont-lie/</loc>
		<lastmod>2026-03-28T13:32:08+00:00</lastmod>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/Packets-Dont-Lie_-How-I-Learned-to-SOC-Up-With-Network-Traffic-Like-an-Analyst.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Suspicious-HTTP-Behavior.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-ARP-Recon-Activity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-DNS-Tunneling.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Data-Embedded-in-DNS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-FTP-Activity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Reconstructed-HTTP-Stream.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://favogab.com/cybermap/wordpress-security-incident-case-study/</loc>
		<lastmod>2026-03-28T12:16:12+00:00</lastmod>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/02/WP.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://favogab.com/lab/analyzing-network-attacks-with-snort/</loc>
		<lastmod>2026-03-28T00:12:02+00:00</lastmod>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/Analyzing-Network-Attacks-with-Wireshark-Snort-in-Lab.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Traffic-Flow-in-Context.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-HTTP-Request-Inspection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Process-to-Network-Correlation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Exploit-Detection-Log4Shell.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Custom-Snort-Rule.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Traffic-Pattern-Detection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-SIEM-Level-Detection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://favogab.com/lab/dissecting-a-real-phishing-kit-case-study/</loc>
		<lastmod>2026-03-27T23:31:03+00:00</lastmod>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/Phishing-Attack-Analysis_-SwiftSpend-Credential-Theft-Exfiltration.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Email-Artifacts.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Indicator-Extraction.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogan-Phishing-Email.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/favogab-Credential-Exposure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://favogab.com/lab/building-a-soc-detection-lab-with-sysmon-and-microsoft-sentinel/</loc>
		<lastmod>2026-03-09T14:41:27+00:00</lastmod>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/SOC-Detection-Lab-with-Sysmon-and-Microsoft-Sentinel01.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/03/Alert-Created.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://favogab.com/cybermap/soc-101-hands-on-detection-analysis/</loc>
		<lastmod>2026-02-12T16:28:20+00:00</lastmod>
		<image:image>
			<image:loc>https://favogab.com/wp-content/uploads/2026/01/soc-101.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->