opexxx
106.2K views | +0 today
opexxx
Your new post is loading...
Your new post is loading...
Scooped by alexander knorr
Scoop.it!

Offensive ELK: Elasticsearch for Offensive Security –

Offensive ELK: Elasticsearch for Offensive Security – | opexxx | Scoop.it
How traditional defensive tools for Offensive security data analysis have advantages over the traditional grep when parsing and analysing data.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Resource: Best Offensive and Exploitation Books in Security by Peerlyst - playbook, hacker, google

Resource: Best Offensive and Exploitation Books in Security by Peerlyst - playbook, hacker, google | opexxx | Scoop.it





Categories of books
1. General exploitation & Reverse engineering books
2. Web Applications
3. Browsers
4. Network
5. Operating Systems
6. Hardware/Firmware/Kernels
7. Security Tools & Appliances
8. Databases
9. Fictionary expl
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Infosec Teams Race To Secure DevOps

Infosec Teams Race To Secure DevOps | opexxx | Scoop.it
Infosec Teams Race To Secure DevOps on Qualys Blog | With DevOps adoption spreading, infosec teams are scrambling to address the new security challenges…...
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Detecting RDP Brute Force with One Hand —

Detecting RDP Brute Force with One Hand — | opexxx | Scoop.it
One of the growing attacks we have seen has been Remote Desktop brute forcing, MITRE ATT&CK technique T1076(link https://attack.mitre.org/wiki/Technique/T1076 ), especially if you have laptops that connect directly to the internet when not at your office. We know what you are thinking…peopl
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Security Tools to Check for Viruses and Malware on Linux

Security Tools to Check for Viruses and Malware on Linux | opexxx | Scoop.it
Wait, Linux needs antivirus and anti-malware solutions? I thought it was immune to such things. Perhaps a bit of clarification is necessary here.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

29 Docker security tools compared

29 Docker security tools compared | opexxx | Scoop.it
A comprehensive list of Docker security tools that can help you implement Docker security best practices.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Windows Commands Abused by Attackers - JPCERT/CC Eyes | JPCERT Coordination Center official Blog

Windows Commands Abused by Attackers - JPCERT/CC Eyes | JPCERT Coordination Center official Blog | opexxx | Scoop.it
Hello again, this is Shusei Tomonaga from the Analysis Center. In Windows OS, various commands (hereafter “Windows commands”) are installed by default. However, what is actually used by general users is just a small part of it. On th
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

SANS Digital Forensics and Incident Response Blog | The new version of SOF-ELK is here. Download, turn on, and get going on forensics analysis. | SANS Institute

SANS Digital Forensics and Incident Response Blog | The new version of SOF-ELK is here. Download, turn on, and get going on forensics analysis. | SANS Institute | opexxx | Scoop.it
SANS Digital Forensics and Incident Response Blog blog pertaining to The new version of SOF-ELK is here. Download, turn on, and get going on forensics analysis.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Red Teaming Mind Map from The Hacker Playbook 3 –

Red Teaming Mind Map from The Hacker Playbook 3 – | opexxx | Scoop.it
A high-level mind map to summarize all the techniques/tools covered by Peter Kim’s book.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Cmd and Conquer: De-DOSfuscation with flare-qdb « Cmd and Conquer: De-DOSfuscation with flare-qdb | FireEye Inc

Learn how to use flare-qdb to bring “script block logging” to the Windows command interpreter, and more....
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Coalfire - Coalfire Blog - PowerShell: In-Memory Injection Using CertUtil.exe

Coalfire - Coalfire Blog - PowerShell: In-Memory Injection Using CertUtil.exe | opexxx | Scoop.it
In this blog post I will discuss the steps to use PowerShell, Invoke-CradleCrafter and Microsoft’s Certutil.exe to craft a payload and one-liner that can be used to evade the latest version of Windows Defender (as of this writing)
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

A sysadmin's guide to SELinux

A sysadmin's guide to SELinux | opexxx | Scoop.it
42 answers to the big questions about life, the universe, and everything else about Security-Enhanced Linux.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Attacking Exchange with MailSniper

Attacking Exchange with MailSniper | opexxx | Scoop.it
Beau Bullock // I’ve added in a few modules to MailSniper that will assist in remote attacks against organizations that are hosting an externally facing Exchange server (OWA or EWS). Specifically, the modules are Get-GlobalAddressList, Invoke-PasswordSprayOWA, and Invoke-PasswordSprayEWS. Get-GlobalAddressList Very often on external penetration tests we perform a reconnaissance phase that might yield us some email …
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

PMP Certification Training Course | Boot Camp for PMP Exam Prep

PMP Certification Training Course | Boot Camp for PMP Exam Prep | opexxx | Scoop.it
Get PMP certified with our tailored PMP boot camp training and 1 year online E-Learning access. Complete PMBoK5 Covered. PMI REP - 3871. 100% money back guarantee. 24/7 support.
more...
No comment yet.