Tag Blue Team

Guide to Attending DEF CON 32 in 2024

Are you planning on attending DEF CON 32? Check out my guide if this will be your first DEF CON. The helpful tips you need to maximize your DEF CON 32 experience.

Incident Response Plan: Building System Imaging WinFE Tools

A step-by-step guide to building a WinFE bootable live OS ISO file for Incident Response or troubleshooting.

Incident Response Plan: Windows Data Collection

Do you have a Data Collection Incident Response Plan? Here is a method to jump-start the process.

Preventing DCSync Attacks

Learn to audit for and prevent DCSync attacks in your Active Directory environment. Most other sources miss more attack paths to DCSync abuse. Find all the DCSync attack paths; if you don’t, the Attackers will.

LetsDefend’s DFIR Challenge: Adobe ColdFusion RCE

A walk-through for the Let’s Defend DFIR Remote Code Execution challenge. A forensic investigation with Obfuscated PowerShell, reverse shells, and web shells.

Guide to Attending DEF CON 31

Are you planning on attending DEF CON 31? Check out my guide if this will be your first DEF CON. The helpful tips you need to maximize your DEF CON 31 experience.

Defend KeePass Against CVE-2023-32784

Find out what you need to know to defend against the KeePass vulnerability CVE-2023-32784!

Deobfuscate PowerShell From Real-World Incident

How to deobfuscate malicious PowerShell using a real-world example. Learn what you need to know now before an incident occurs!

NIST Server Hardening Best Practices

How security hardened are your servers really? Find out the free tools and methods to ensure your environment is NIST standards hardened and compliant!

Client System Hardening Best Practices & Testing

Are you looking for Client System Hardening Best Practices? Find out how you can test and improve your Windows Client environment security!

« Older posts

© 2024 Cyber Gladius

    Follow Me on my Mastodon      - Infosec.Exchange Mastodon     IOC.Exchange Mastodon

Up ↑