Crypto

Blog Articles

SOC On A Budget SMB MittreAttack Checker InfoSec PS Security SysMon.ps1

SOC on a Budget - Small Business Companies

 


MittreAttackCheckerInfoSecPSSecuritySysMon.ps1 

 


- Event log threat hunting based on Mittre Attack Framework List

CISSP Domain 8

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

As for Domain 8, these are my notes:

 

CISSP Domain 7

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 7, these are my notes:

 

CISSP Domain 6

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 6, these are my notes:

 

CISSP Domain 5

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 5, these are my notes:

 

CISSP Domain 4

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 4, these are my notes:

 

CISSP Domain 3

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 3, these are my notes:

 

CISSP Domain 2

Certified Information Systems Security Professional logo

 

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 2, these are my notes:

 

CISSP Domain 1

Certified Information Systems Security Professional logo

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 1, these are my notes:

 

Linux: sudo escalation of privileges - IT Professionals Guide

1. Create User and make sure they're able to login

Setup for login and execute tasks:

First you would have created a user:

useradd -m bob -G sudo -s /bin/bash
passwd bob

Being able to login you add to .profile (on top)
vi .profile
PATH=/usr/sbin:$PATH

check who's in sudo with:

groups sudo
groups bob

 

1.1.groups.bob 

Penetration Testing and Ethical Hacking

 

 

penetration testing and ethical hacking

Ethical Hacking: Ken Underhill

Penetration Testing and Ethical Hacking

Course at Cybrary: https://cybrary.it/course/ethical-hacking/

Workstations and Domain Admins

You might wonder, how Attackers can gain Acccess to your Gold Mine, Active Directory.

Well, it’s simple, somebody from you organisation who has Domain Admin rights, logged in on a workstation with his Domain Admin credentials.

 

So, how does one prevent this?

 

There is the cached credentials setting in the Group Policy.

Anything set there is cached. By default it’s 10 cached credentials. That’s a serious security issue.

 

In order to prevent this you must take in account, and for sake of arguments we are going to mention the obvious:

Subcategorieën