Open in app

Sign in

Write

Sign in

Pepijn Vissers
Pepijn Vissers

22 Followers

Home

About

Published in

Chapter8

·3 days ago

Deception 101 — Part 3: Documents with passwords

Increasing the chance of catching criminal hackers is essential in both furthering the reduction of cybercrime and for identifying hackers in your network. In this series of articles, Chapter8 gives you various tips to set digital tripwires in your network. We’re going to trap hackers using deception. Are you in? Introduction …

Deception

15 min read

Deception 101 — Part 3: Documents with passwords
Deception 101 — Part 3: Documents with passwords
Deception

15 min read


Published in

Chapter8

·Nov 23

Deception 101 — Part 2: Honeytoken account in Active Directory

Increasing the chance of catching criminal hackers is essential in both furthering the reduction of cybercrime and for identifying hackers in your network. In this series of articles, Chapter8 gives you various tips to set digital tripwires in your network. We’re going to trap hackers using deception. Are you in? Introduction …

Cybersecurity

11 min read

Deception 101 — Part 2: Honeytoken account in Active Directory
Deception 101 — Part 2: Honeytoken account in Active Directory
Cybersecurity

11 min read


Published in

Chapter8

·Nov 17

Deception 101 — Part 1: Prerequistes

Increasing the chance of catching criminal hackers is essential in both furthering the reduction of cybercrime and for identifying hackers in your network. In this series of articles, Chapter8 gives you various tips to set digital tripwires in your network. We’re going to trap hackers using deception. Are you in? Introduction …

Cybersecurity

10 min read

Deception 101 — Part 1: Prerequistes
Deception 101 — Part 1: Prerequistes
Cybersecurity

10 min read


Published in

Chapter8

·Nov 10

Deceptie 101: Level 2 — Documenten met wachtwoorden

Inleiding Deceptie draait om misleiding. Misleiding draait om aantrekkingskracht en geloofwaardigheid. En wat is geloofwaardiger dan een document met wat wachtwoorden? Je zou zeggen dat dit te simpel is om waar te zijn, maar bij Chapter8 komen we ze werkelijk in elke opdracht tegen, als we werken met een aanvalstechniek die…

Deception

14 min read

Deceptie 101: Level 2 — Documenten met wachtwoorden
Deceptie 101: Level 2 — Documenten met wachtwoorden
Deception

14 min read


Published in

Chapter8

·Oct 10

Deceptie 101: Level 1 — Honeytoken-account in Active Directory

Inleiding Active Direcory. Bijna elke organisatie die met Microsoft-producten werkt, gebruikt Active Directory voor het managen van rechten van gebruikers, groepen, computers… eigenlijk zowat de hele digitale organisatie. Mede daarom is Active Directory een absoluut kroonjuweel in elke organisatie die het gebruikt. De hoogste rechten binnen Active Directory zijn toegekend aan…

Deception

11 min read

Deceptie 101: Level 1 — Honeytoken-account in Active Directory
Deceptie 101: Level 1 — Honeytoken-account in Active Directory
Deception

11 min read


Published in

Chapter8

·Sep 28

Deceptie 101: Level 0 — voorbereiding is alles

Inleiding Het vergroten van de pakkans van criminele hackers is essentieel in het verder terugdringen van cybercrime en in het onderkennen van aanvallers in je netwerk. In de serie “Deceptie 101” geeft Chapter8 je verschillende tips om digitale struikeldraadjes te zetten voor een hacker die in je netwerk zit. We gaan…

Deception

9 min read

Deceptie 101: Level 0 — voorbereiding is alles
Deceptie 101: Level 0 — voorbereiding is alles
Deception

9 min read


Sep 24, 2022

#IRanASignalProxy

Setting up a Signal proxy on your own VPS. So, with all kinds of shit happening all over the world, Signal has started a campaign to urge people to run their own Signal Proxy — preferably on a unconspicuous webserver. …

Censorship

5 min read

#IRanASignalProxy
#IRanASignalProxy
Censorship

5 min read


Published in

Chapter8

·Mar 12, 2022

Plant a tree. Now.

Geopolitics and the state of cyber. “The best time to plant a tree was 20 years ago. The second best time is now.” — Chinese proverb. Hello dear readers, Although our next blog was supposed to be a short pun article on the importance of offensive forward security and training…

Cybersecurity

7 min read

Plant a tree. Now.
Plant a tree. Now.
Cybersecurity

7 min read


Published in

Chapter8

·Feb 4, 2022

Advanced Purple Teaming

The what, why, when, where and how. Part one: the what. Hi there, dear readers. You got the APT-joke in the title, right? Good! In this small blog post series, I’ll take you through a virtual Purple Team Mission from early start to aftercare. The way most people know about…

Cybersecurity

6 min read

Advanced Purple Teaming
Advanced Purple Teaming
Cybersecurity

6 min read


Published in

Chapter8

·Jan 22, 2022

Adding our own Kill Chain to VECTR

…because the industry standards do not always suffice. TL;DR: we added our own Time Phased Kill Chain to VECTR to be able to report attack paths and detection results in the order that they actually took place. …

Cybersecurity

11 min read

Adding our own Kill Chain to VECTR
Adding our own Kill Chain to VECTR
Cybersecurity

11 min read

Pepijn Vissers

Pepijn Vissers

22 Followers

Founder // Healer @ Chapter8.com

Following
  • Crypt0jan

    Crypt0jan

  • Cedric Owens

    Cedric Owens

  • Gijs Hollestelle

    Gijs Hollestelle

  • Cyb3rt

    Cyb3rt

  • Rob Berends

    Rob Berends

See all (10)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams