How to Stay on Top of Cybersecurity News
The top tools and news sources you need to know if you are in cybersecurity. Don’t get caught off guard by an attack!
The top tools and news sources you need to know if you are in cybersecurity. Don’t get caught off guard by an attack!
If you are not using these free tools to secure Active Directory, then you’re an easy target! Find the vulnerabilities lurking in your Active Directory environment before the attackers do.
How you can create fun and engaging cybersecurity tabletop exercises at your organization. Fulfill compliance requirements for tabletop exercises or security awareness training with the provided documents.
How to audit and better secure Active Directory passwords. The latest updates to enterprise password policy and best practices. Tips on how you can stay up to date on breaches.
How to securely create a Windows Scheduled Task that requires high domain level privileges. Leveraging standalone Managed Service Accounts(sMSA) to automate administrative tasks.
Are you defending PowerShell abuse in your network? Find out the PowerShell best practices for preventing abuse.
Many Active Directory attacks’ root vulnerability is the domain’s AD Access Control Lists. This post explains what you need to know about the AD Access Control List to prevent lateral movement and escalation of privileges in the domain.
The tips you need to know for the Hack The Box Dante Pro Lab challenge. Are you ready for the challenge? My review of Hack The Box’s Dante Pro Lab.
How to deobfuscate malicious PowerShell using a real-world example. Learn what you need to know now before an incident occurs!
Getting starting in scripting PowerShell? Check out these tips every beginner needs to know.
If you are not using these free tools to secure Active Directory, then you’re an easy target! Find the vulnerabilities lurking in your Active Directory environment before the attackers do.
Learn advanced network tunneling for pentesting. Limited access to a network, no problem! The skills you must know to complete the hack-the-box Dante Pro Lab.
Learn how to build network tunnels for pentesting or day-to-day systems administration. Learn the skills you must know to complete the hack-the-box Dante Pro Lab.
Hack-The-Box Walkthrough for the machine Support. A writeup on how to PWN the Support server.
A custom company-specific wordlist is vital to conducting password audits or blocking weak passwords from being set. Read how you can build a wordlist targeted at your company and defend against weak passwords.
How to securely create a Windows Scheduled Task that requires high domain level privileges. Leveraging standalone Managed Service Accounts(sMSA) to automate administrative tasks.
How to audit and better secure Active Directory passwords. The latest updates to enterprise password policy and best practices. Tips on how you can stay up to date on breaches.
LetsDefend’s Malware Analysis: Suspicious Browser Extension Walk-Through. Everything you need to know to solve the challenge!