Ferdi birgülferdibirgul.hashnode.dev·Mar 9, 2024Blue Team Level 1 NotesCommon Ports PortServiceDescription 20,21FTPFile Transfer Protocol used to transfer files b/w systems. 22SSHSecure Shell Protocol allows users to securely connect to a remote host. 23TelnetUsed before SSH, allows users to connect to a remote...Discuss·10 likes·63 readsferdibirgül
Reza RashidiforRedTeamReciperedteamrecipe.com·Mar 1, 2024Trended Protocols for Security StuffNetwork Protocols: IDProtocolSecurity Attack VectorSecurity Issues Score 1TelnetMan-in-the-Middle Attacks70 2SNMPv1Information Disclosure65 3NetBIOSNetwork Reconnaissance60 4SMBv1Remote Code Execution80 5WEPWireless Data Interception75 6A...Discuss·1.5K readsredteaming
Reza RashidiforRedTeamReciperedteamrecipe.com·Feb 9, 2024Important Active Directory Attribute for Red/Blue TeamerActive Directory attributes play a crucial role in managing user accounts and group memberships within Windows environments. Attributes such as SAMACCOUNTNAME and USERPRINCIPALNAME are often targeted for username enumeration and phishing attacks. The...Discuss·960 readsredteaming
Ray Makasiraymakasi.hashnode.dev·Jan 29, 2024Cross-tenant impersonation: Best practice tips from OktaIdentity attacks, specifically impersonation attacks, represent a significant and growing threat to organizations. Over the past couple of months, this has been well documented. Okta Security has identified a cluster of activity in which: Threat act...Discussokta
Maik Romaikroservice.com·Aug 29, 2023How to get started with Monitoring on the Blue Team: A Step-By-Step GuideFirst up - What is the Blue Team anyway? Good Question - the Blue Team is typically not just a single team. It is a combination of multiple security disciplines combined for ease of speech. Similar to how Red Team sometimes means pentester as well. W...Discuss·1 like·775 readsSIEM
Secdrillsecdrill.hashnode.dev·Aug 25, 2023Basic Practice for Server SecurityOn the Internet, thousands of Servers are vulnerable and misconfigured out there not well maintained and patched. As a server maintainer, SysAdmins needs to configure the system well to tackle the security breach that is happening on hundreds of serv...Discuss·1 likeSecurity
Brendan Mejiathecyberstudent.hashnode.dev·Aug 17, 2023CIA TriadAh yes, the good ol' CIA triad that is vital, and in all honesty is the foundation of cybersecurity. Typically, for my fellow junior analysts here, I wouldn't find it surprising if for almost every other interview you had been asked the question "Wha...DiscussCIA TRIAD
Brendan Mejiathecyberstudent.hashnode.dev·Aug 16, 2023Security Blue Team Level 1 exam/course overviewStanding ovation for the team over at Security Blue Team to deliver such an amazing course that if you were to take only this exam alone before starting your first day on the job as a Junior Security Analyst you will be in good standing. Background I...Discuss·488 readsblueteam
Brendan Mejiathecyberstudent.hashnode.dev·Aug 15, 2023Security Blue Team Level 1 (Personal experience not exam overview)Good evening or night is it? Currently around 10 PM EST. Regardless, like the title says I took https://www.securityblue.team/'s Level 1 certification and wanted to go over my personal story leading up to the exam, not the exam itself. I will go over...Discuss·110 reads#cybersecurity
bmurrbmurrtech.hashnode.dev·Aug 4, 2023Build your own #malware #analysis #sandbox!An overview of what it takes to build your own #malware #analysis #sandbox! The core steps are (but not limited to): 1 — Virtualize Start with a #freeware #hypervisor like #Oracle #VirtualBox. For a malware #analysis lab, you’ll want a #free #Windows...Discusscybersecurity