Hi everyone!
This is a partial collection of my notes, personal thoughts and projects I've worked on.
This is a partial collection of my notes, personal thoughts and projects I've worked on.
Windows Enumeration
The following list of commands can be used in a local Windows environment to enumerate all useful information.
Windows Operating System Enumeration
Basic OS Information
Get-ComputerInfo
Installed Patches
Get-CimInstance -query 'select * from win32_quickfixengineering' | foreach $_.hotfixid {Get-Hotfix}
Use the attribute -description "Secu...
NIST Incident Handling Process
Introduction
The NIST (National Institute of Standards and Technology) Incident Handling Process is a structured approach for managing security incidents, problems, and events. This process is detailed in NIST Special Publication 800-61, titled “Computer Security Incident Handling Guide”. The goal is to help organizations - particularly federal...
Online Tools for Threat Analysis
In today’s digital age, cybersecurity threats are increasingly complex and sophisticated and a member of a Blue Team has to know analyze them rapidly.
For this reason I wanted to write a list of best online tools for Threat Intelligence and Analysis and post it to my blog to have a rapid access.
The following online tools are used mostly for T...
The Genesis of "Cyber"
The term “cyber” has a fascinating history that spans various languages and disciplines over time.
This term finds its roots in the Sanskrit word “kubara,” which means “rudder” or “helm”, from which derives the Greek term “kubernetes,” which means “helmsman” or “governor” and its relative verb “kubernao” i.e. “hold the helm of a ship”, “to gove...