opexxx
99.7K views | +2 today
 
opexxx
Your new post is loading...
Your new post is loading...
Rescooped by alexander knorr from Big Data Security Analytics
Scoop.it!

Power Your Response With Incident Visualization

Power Your Response With Incident Visualization | opexxx | Scoop.it
“ Resilient Incident Visualization graphically displays relationships between indicators of compromise and incidents in an organization's environment.”
Via cysap
more...
No comment yet.
Rescooped by alexander knorr from d@n3n
Scoop.it!

HOWTO: Port Forwards through a SOCKS proxy

HOWTO: Port Forwards through a SOCKS proxy | opexxx | Scoop.it

Recently, I’ve had multiple people ask about port forwards with Cobalt Strike’s Beacon payload. Beacon has had SOCKS proxy pivoting support since June 2013. This feature opens a SOCKS proxy server on the team server.


Via Danen Raas
more...
No comment yet.
Rescooped by alexander knorr from Cyber Security & Digital Forensics
Scoop.it!

Welcome [Root Me : Hacking and Information Security learning platform]

Welcome [Root Me : Hacking and Information Security learning platform] | opexxx | Scoop.it
“ Hundreds of challenges are available to train yourself in different and not simulated environments, offering you a way to learn a lot of hacking technics !”
Via Emilio, Constantin Ionel Milos / Milos Constantin
more...
Rescooped by alexander knorr from Cyber Security & Digital Forensics
Scoop.it!

FORENSIC CHALLENGES

FORENSIC CHALLENGES | opexxx | Scoop.it

Via Constantin Ionel Milos / Milos Constantin
more...
Juan Vazquez's curator insight, June 23, 8:42 PM
Forensic Challenges #security
Scooped by alexander knorr
Scoop.it!

CSX Europe Conference | Cybersecurity Conference | CSX 2016 - ISACA

CSX Europe Conference | Cybersecurity Conference | CSX 2016 - ISACA | opexxx | Scoop.it
Join us for high-impact sessions uniquely built around five cyber tracks.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Grundlagen der Cybersicherheit (Winter Term 2015/16) | ISC Information Security and Cryptography Group

more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Microsoft Security Development Lifecycle

Learn about the Microsoft Security Development Lifecycle (SDL) and how it can improve software development security.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Best Hacking OS For a Hacker-2016

Best Hacking OS For a Hacker-2016 | opexxx | Scoop.it
This blog is fully dedicated to the Best Hacking OS  for a Hacker.Which type of OS will be suitable for a professional or a beginners Hacker you will get answer of all this type of question after reading this blog.
more...
No comment yet.
Rescooped by alexander knorr from "Computação Forense"
Scoop.it!

Another Forensics Blog: How to image a Mac with Live Linux bootable USB

Another Forensics Blog: How to image a Mac with Live Linux bootable USB | opexxx | Scoop.it

Via João Carvalho
more...
No comment yet.
Rescooped by alexander knorr from Information Governance & eDiscovery Snapshot
Scoop.it!

Why law firms must overthrow legacy IT 

Why law firms must overthrow legacy IT  | opexxx | Scoop.it
“ Traditional industries like the legal sector must build their case for investing in updated technologies to address the businesses challenges they face”
Via Mindseye
more...
No comment yet.
Rescooped by alexander knorr from Securitysplaining For Consumers
Scoop.it!

10 security Ted Talks you can't miss

10 security Ted Talks you can't miss | opexxx | Scoop.it
We know you're busy, that's why we invested the time to find you the 10 Security TED talks that you really can't miss.
Via Jon Campbell
more...
No comment yet.
Rescooped by alexander knorr from d@n3n
Scoop.it!

Recovering A Ransomed PDF

Recovering A Ransomed PDF | opexxx | Scoop.it

I was contacted to help with a PDF file encrypted by ransomware. Just like another case I helped with, the file was not completely encrypted.


Via Danen Raas
more...
No comment yet.
Rescooped by alexander knorr from Cyber Security & Digital Forensics
Scoop.it!

 WarBerryPi - Tactical Exploitation  / by : secgroundzero/warberry

 WarBerryPi - Tactical Exploitation  / by : secgroundzero/warberry | opexxx | Scoop.it

Warberry - WarBerryPi - Tactical Exploitation


Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by alexander knorr from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Network Forensic System for ICMP Attacks.pdf


Via Constantin Ionel Milos / Milos Constantin, mkrul
more...
No comment yet.
Rescooped by alexander knorr from d@n3n
Scoop.it!

wafw00f

wafw00f | opexxx | Scoop.it

wafw00f - WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.


Via Danen Raas
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

ICT Professionalism Survey

Web survey powered by SurveyMonkey.com. Create your own online survey now with SurveyMonkey's expert certified FREE templates.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Mobile Security and Risk Review für das 4. Quartal 2015 | MobileIron

Mobile Security and Risk Review für das 4. Quartal 2015 | MobileIron | opexxx | Scoop.it
Mobile Security and Risk Review für das 4. Quartal 2015:
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

How I learned to stop worrying and love the cloud: Azure Forensics for the Security Responder

How I learned to stop worrying and love the cloud: Azure Forensics for the Security Responder | opexxx | Scoop.it
This blog post is from Troy Larson, a true leader in the field of digital forensics and engineer on the Microsoft Security Response Center’s Azure team.  Troy is focused on building and measuring forensic capabilities in the Azure platform, and executing advanced security investigations.  Troy has been on the front lines of critical cases for Microsof
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Systems Admins: We Need To Talk.

Systems Admins: We Need To Talk. | opexxx | Scoop.it
I'm frustrated. Frustrated because I keep seeing articles about businesses, specifically hospitals, being ransom-wared into submission. In the past month, I can recall three specific instances. Some paid the ransom. One is still in limbo. Each system claims that their data is being held hostage, and that the ransomer is demanding somewhere between $1600 and…
more...
No comment yet.