web analytics

Cyber Security – Red Team

Rules of Engagements Section Name Section Details Executive Summary Overarching summary of all contents and authorization within RoE document Purpose Defines why the RoE document is used References Any references used throughout the RoE document (HIPAA, ISO, etc.) Scope Statement of the agreement to restrictions and guidelines Definitions Definitions of technical terms used throughout the RoE document Rules of Engagement and Support Agreement Defines … Read more

Digital Forensics andĀ Investigations

Most used common passwords: https://www.ncsc.gov.uk/blog-post/passwords-passwords-everywhere Chain of Custody form: https://www.nist.gov/document/sample-chain-custody-formdocx pdfinfo – you can install it using sudo apt install poppler-utils here are many online and offline tools to read the EXIF data from images. One command-line tool is exiftool. ExifTool is used to read and write metadata in various file types, such as JPEG images. (The AttackBox … Read more

Cyber Kill Chain

According to Lockheed Martin, the Cyber Kill Chain has seven steps: Recon: Recon, short for reconnaissance, refers to the step where the attacker tries to learn as much as possible about the target. Information such as the types of servers, operating system, IP addresses, names of users, and email addresses, can help the attackā€™s success. Weaponization: … Read more