"CyberGuard: Malware and Vulnerabilities Analysis"ElasticCase Blue Team LabCategory: Threat Hunting2d ago2d ago
"CyberGuard: Malware and Vulnerabilities Analysis"Analyzing Captured Traffic for Reverse Shell Indicators Using WiresharkReverse shell attacks can be executed through various HTTP methods used for file uploads, not just POST. This guide will cover how to…Jun 18Jun 18
"CyberGuard: Malware and Vulnerabilities Analysis"Exploiting Sticky Keys via Sethc.exe for Privilege Escalation on WindowsOverview: Sticky Keys is an accessibility feature in Windows, but it can be exploited by attackers for privilege escalation. This method…Jun 16Jun 16
"CyberGuard: Malware and Vulnerabilities Analysis"Malware Traffic AnalysisWireshark exercise One Hot MessJun 13Jun 13
"CyberGuard: Malware and Vulnerabilities Analysis"SigmaProvide understanding to Sigma, a Generic Signature Format for SIEM Systems.May 23May 23
"CyberGuard: Malware and Vulnerabilities Analysis"SOARLearn the concepts and methodology surrounding security orchestration, automation and response.May 22May 22
"CyberGuard: Malware and Vulnerabilities Analysis"Aurora EDRFamiliarise with the use of a Sigma-based EDR tool, Aurora.May 20May 20
"CyberGuard: Malware and Vulnerabilities Analysis"Enhancing Email Security: Manually Verifying Sender’s Email with DIG and Subnet CalculatorIn today’s digital age, email security is paramount. Phishing attempts and fraudulent emails are rampant, and it is crucial to verify the…May 161May 161
"CyberGuard: Malware and Vulnerabilities Analysis"Threat Intelligence for SOCLearn how to utilise Threat Intelligence to improve the Security Operations pipeline.May 121May 121
"CyberGuard: Malware and Vulnerabilities Analysis"Intro to Log AnalysisAn intro to log analysis, best practices, and essential tools for effective detection and response.May 9May 9