مقاله ای جالب در خصوص تشخیص حملات در لینوکس با فعال سازی لاگ Auditd
https://izyknows.medium.com/linux-auditd-for-threat-detection-final-9d5173706b3f
@Engineer_Computer
https://izyknows.medium.com/linux-auditd-for-threat-detection-final-9d5173706b3f
@Engineer_Computer
Medium
Linux auditd for Threat Detection [Final]
Mapping behaviors to auditd log events
حواستان به خود سیسمون هم باشد و خرابی خودش را رسیدگی کنید
شماره رویداد ۲۵۵
https://systemweakness.com/list-of-sysmon-event-ids-for-threat-hunting-4250b47cd567
@Engineer_Computer
شماره رویداد ۲۵۵
https://systemweakness.com/list-of-sysmon-event-ids-for-threat-hunting-4250b47cd567
@Engineer_Computer
Medium
List of Sysmon Event IDs for Threat Hunting
Features of Sysmon:
👍2
Data Exfiltration Cheat Sheet.pdf
5.9 MB
چطور هکرها داده ها را از سازمانتان خارج میکنند؟
@Engineer_Computer
@Engineer_Computer
Now you can detect phishing websites quickly with Nuclei❤
@Engineer_Computer
nuclei -l websites_Possible_Phishing -tags phishing -itags phishing
@Engineer_Computer
https://www.youtube.com/watch?v=4YOpILi9Oxs&list=PL0vfts4VzfNg9sTDAPew0MT0isOeCCkjR&index=3
@Engineer_Computer
@Engineer_Computer
YouTube
7 Security risks you should never take as a developer
Top 7 security concepts 🛡️ and hacking stories 🎭 that every JavaScript developer should know about. Master these concepts in the Enterprise Security course: https://bit.ly/2wrUqAB (use FIRESHIP50 at checkout).
Full Security Article https://fireship.io/lessons/7…
Full Security Article https://fireship.io/lessons/7…