Open in app

Sign In

Write

Sign In

K O M A L
K O M A L

374 Followers

Home

About

Published in InfoSec Write-ups

·Jan 15

SANS 2022 Holiday Hack Challenge & KringleCon

PCAP file & Windows event logs investigation — KringleCon 2022 - Register Today! KringleCon is a virtual conference for security-minded people and hackers from around the world, hosted by Santa and…2022.kringlecon.com Let’s dive straight into these suspicious file investigation challenge and answer their questions. Wireshark Practice Challenge A suspicious pcap file was provided to investigate a malicious network traffic. For anyone who doesn’t have wireshark can use this free online pcap file analyzer for investigation (although having wireshark is best!) - https://apackets.com.

Kringlecon

5 min read

SANS 2022 Holiday Hack Challenge & KringleCon
SANS 2022 Holiday Hack Challenge & KringleCon
Kringlecon

5 min read


Published in InfoSec Write-ups

·Dec 24, 2022

Performing Security Gap Analysis using Breach & Attack Simulation (BAS) Tools

Continuous Testing and Auditing - Purple Teaming Activity — BAS overview BAS is a type of an advanced security testing method. It is designed to determine if an organisation’s existing security controls detects and respond to attack as they should in order to improve the security posture of the organisation. Some of the BAS Platforms are: The below diagram shows where…

Breach Attack Simulation

4 min read

Performing Security Gap Analysis using Breach & Attack Simulation (BAS) Tools
Performing Security Gap Analysis using Breach & Attack Simulation (BAS) Tools
Breach Attack Simulation

4 min read


Dec 19, 2022

CISSP Domain 3 Notes - Security Architecture and Engineering

Study Guide 9th edition — Research, Implement and manage Engineering processes using secure design principles Threat Modelling Prioritizing threats against an organisation’s valuable assets. 3 common Threat Modelling Techniques to Identify Threats: Focused on Assets Focused on Attackers Focused on Software Threat Modelling Approach Process for Attack Simulation and Threat Analysis (PASTA) A seven-stage threat modelling methodology. PASTA is a risk-centric approach that aims at selecting or…

Cissp

25 min read

CISSP Domain 3 Notes - Security Architecture and Engineering
CISSP Domain 3 Notes - Security Architecture and Engineering
Cissp

25 min read


Published in InfoSec Write-ups

·Dec 15, 2022

Using Threat Intelligence data to generate MISP alerts

There are various Threat Intelligence sources that shares threat information with each other to help identify those threats in their organisation and respond to those issues. Some of these Threat Intelligence platforms are: AlientVault MalwareBytes CISA WhoisXMLAPI CiSP MITRE CRITS In MISP, these Threat intelligence sharing platforms are mostly integrated…

Cisp

4 min read

Using Threat Intelligence data to generate MISP alerts
Using Threat Intelligence data to generate MISP alerts
Cisp

4 min read


Published in InfoSec Write-ups

·Dec 9, 2022

Operationalizing MITRE ATT&CK to harden cyber defenses

Take Adversary’s perspective in Defender’s Team — Having recently completed the ‘Foundations of Operationalizing MITRE ATT&CK’ course, I thought it’ll be useful to share some of the key notes and share with you all that I’ve learnt from this widely-recognised and accepted defense framework in Cyber Security. Intro to MITRE ATT&CK A framework where defenders takes the adversary’s perspective to find…

Mitre Attack

5 min read

Operationalizing MITRE ATT&CK to harden cyber defenses
Operationalizing MITRE ATT&CK to harden cyber defenses
Mitre Attack

5 min read


Published in InfoSec Write-ups

·Dec 5, 2022

HTB Time [writeup]

RCE and SSRF Vulnerabilities — Reconnaissance & Enumeration Nmap TCP/UDP Scan Output

Htb

4 min read

HTB Time [writeup]
HTB Time [writeup]
Htb

4 min read


Published in InfoSec Write-ups

·Dec 2, 2022

Cloud Compute Instance Setup

AWS — Advantages of using Cloud Instances OpEx Investment for businesses at low cost Using Cloud storage for data backup storgae Ease of Use Low maintenance cost Advanced data security AWS Cloud AWS offers Free tier for upto 12 months. This includes: 750 hours of t2.micro (or t3.micro in the Regions in which t2.micro is unavailable) instance usage on…

AWS

4 min read

Cloud Compute Instance Setup
Cloud Compute Instance Setup
AWS

4 min read


Published in InfoSec Write-ups

·Nov 18, 2022

HTB Omni [writeup]

Exploiting Windows IoT Core using SireRAT — Summary This is a windows IoT machine vulnerable to Remote Code Execution (RCE). A Remote Access Trojan (RAT) tool called SirepRAT is used to exploit this vulnerability to get root. OS: Windows 10 IOT Core x64bit Architecture Tools Used: nmap SirepRAT — Windows IOT RCE Reconnaissance and Enumeration - NMAP TCP Output

Hackthebox

3 min read

HTB Omni [writeup]
HTB Omni [writeup]
Hackthebox

3 min read


Published in InfoSec Write-ups

·Nov 16, 2022

Fine-Tune Security Alerts & Optimisation

Blue Team SOC Activity — What is Security Alerts Tuning? A constant process of removing and reducing false-positive alerts volume to increase accuracy. It also helps improve CPU’s performance by reducing process-overloading. Before tuning, first identify the suitable tuning point as there are some different ways to tune an alert. These are: Tuning in Security Onion Tuning in SIEM Tuning…

Security

4 min read

Fine-Tune Security Alerts & Optimisation
Fine-Tune Security Alerts & Optimisation
Security

4 min read


Nov 12, 2022

CISSP Domain 2 notes- Asset Security

Study Guide 9th Edition — Chapter 5 Identifying and Classifying Information & Assets Personally Identifiable Information (PII) i.e. any information that can identify an individual — NIST. Protected Health Information (PHI) i.e. health-related information — HIPPA Proprietary Data i.e software code, product’s technical plans, intellectual property or trade secrets

Cybersecurity

4 min read

CISSP Domain 2 notes- Asset Security
CISSP Domain 2 notes- Asset Security
Cybersecurity

4 min read

K O M A L

K O M A L

374 Followers

Cyber Security Enthusiast

Following
  • Sai Krishna Kothapalli

    Sai Krishna Kothapalli

  • Mayur Parmar

    Mayur Parmar

  • Bbinfosec

    Bbinfosec

  • Perth Ngarmtrakulchol

    Perth Ngarmtrakulchol

  • Katie Paxton-Fear

    Katie Paxton-Fear

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech