First things first: Threat Modelling using Free and Open Source Tools by Roger Carhuatocto
On 2014 RSA Conference (archive not available), Eric Olson of Cyveillance said a good and real simil about Threat Modelling: “It is a lot like teenage sex: Everyone is talking about it, everyone thinks everyone else is doing it, and most of the few people who are actually doing it aren’t doing it all that well”.
Source
#useful #DevSecOps
On 2014 RSA Conference (archive not available), Eric Olson of Cyveillance said a good and real simil about Threat Modelling: “It is a lot like teenage sex: Everyone is talking about it, everyone thinks everyone else is doing it, and most of the few people who are actually doing it aren’t doing it all that well”.
Source
#useful #DevSecOps
👍4
👍4❤1
Penetration Testing Guide Via Cyber Press.pdf
6.4 MB
Quick Start Guide to Penetration Testing (ENG)
👍5
Incident Response Playbooks and workflows for Account Compromised, Critical, Data Loss, Malware, Phishing, Ransom
#docs
#docs
👍4
Incident_Response_Playbooks_and_workflows_for_Account_Compromised.pdf
3.9 MB
Incident Response Playbooks and workflows for Account Compromised, Critical, Data Loss, Malware, Phishing, Ransom
👍4
Cyber Security Toolkit for Boards
Resources designed to help board members govern cyber risk more effectively.
#docs
Resources designed to help board members govern cyber risk more effectively.
#docs
👍3
Wi-Fi Credential Dumping, 2023
When the term "password cracking" is used in the cyber world, it is being used as a broad concept as itnshelters all the methods related to attacking/dumping/retrieving passwords of the victim/target. But today, in this post we will solely focus on a technique called "credential dumping.
Credential dumping is said to be a technique through which usernames and passwords are extracted from any login account on the target system. It is this technique that allows an attacker to get credentials for multiple accounts from one person. And these credentials can be for anything, such as a bank, email account, social media account, or wireless network.
#pentest
When the term "password cracking" is used in the cyber world, it is being used as a broad concept as itnshelters all the methods related to attacking/dumping/retrieving passwords of the victim/target. But today, in this post we will solely focus on a technique called "credential dumping.
Credential dumping is said to be a technique through which usernames and passwords are extracted from any login account on the target system. It is this technique that allows an attacker to get credentials for multiple accounts from one person. And these credentials can be for anything, such as a bank, email account, social media account, or wireless network.
#pentest
👍4
Forwarded from CyberSecBastion
👍4
Forwarded from CyberSecBastion
𝗔𝗪𝗦_𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆_𝗜𝗻𝗰𝗶𝗱𝗲𝗻𝘁_𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗲_𝗚𝘂𝗶𝗱𝗲.pdf
1003 KB
AWS Security Incident Response Guide: AWS Technical Guide
👍2