Blog

Hi everyone!
This is a partial collection of my notes, personal thoughts and projects I've worked on.

Windows Enumeration

The following list of commands can be used in a local Windows environment to enumerate all useful information. Windows Operating System Enumeration Basic OS Information Get-ComputerInfo Installed Patches Get-CimInstance -query 'select * from win32_quickfixengineering' | foreach $_.hotfixid {Get-Hotfix} Use the attribute -description "Secu...

Read more

NIST Incident Handling Process

Introduction The NIST (National Institute of Standards and Technology) Incident Handling Process is a structured approach for managing security incidents, problems, and events. This process is detailed in NIST Special Publication 800-61, titled “Computer Security Incident Handling Guide”. The goal is to help organizations - particularly federal...

Read more

Online Tools for Threat Analysis

In today’s digital age, cybersecurity threats are increasingly complex and sophisticated and a member of a Blue Team has to know analyze them rapidly. For this reason I wanted to write a list of best online tools for Threat Intelligence and Analysis and post it to my blog to have a rapid access. The following online tools are used mostly for T...

Read more

The Genesis of "Cyber"

The term “cyber” has a fascinating history that spans various languages and disciplines over time. This term finds its roots in the Sanskrit word “kubara,” which means “rudder” or “helm”, from which derives the Greek term “kubernetes,” which means “helmsman” or “governor” and its relative verb “kubernao” i.e. “hold the helm of a ship”, “to gove...

Read more

ETHQuery

ETHQuery is an University project: a simple client-side web application that performs queries upon Ethereum blockchain to receive transactions information about a wallet address. Github https://github.com/z3f1r0/ETHQuery/tree/main

Read more