pinku rajbongshiDocument AnalysisDocuments are a common way of sending or storing information like messages, reports, videos, or ideas. MS Office documents, Images, and…Mar 29Mar 29
pinku rajbongshiPowerShell LoggingTo configure different parts of PowerShell logging, we will edit the local group policy on our Windows 10 client machine. This can be done…Oct 24, 2023Oct 24, 2023
pinku rajbongshiExploit Develpoment — 01This blog is focuses on applications that are written in low-level languages such as C++ and then compiled into binary code. For such…Sep 2, 2023Sep 2, 2023
pinku rajbongshiWorkforce Framework for Cybersecurity lllWorkforce Framework for Cybersecurity (NICE Framework) SP 800–181 Rev. 1May 29, 2023May 29, 2023
pinku rajbongshiActive DefenseActive defense refers to a set of cyber security strategies and tactics that involve proactively detecting and defending against cyber…Jan 29, 2023Jan 29, 2023
pinku rajbongshiThreat Hunting via Anomaly InvestigationAnomaly investigation-based hunting is a method of identifying potential security threats by searching for abnormal or unusual activity in…Jan 27, 2023Jan 27, 2023
pinku rajbongshiThreat actor-focused threat huntingThreat actor-focused hunting is a method of identifying potential security threats by searching for specific malicious actors or groups…Jan 27, 2023Jan 27, 2023
pinku rajbongshiAttack Tactic Focused Threat HuntingAttack tactic-focused hunting is a method of identifying potential security threats by searching for specific attack tactics used by…Jan 27, 2023Jan 27, 2023
pinku rajbongshiAttack Technique Focused Threat HuntingAttack technique-focused threat hunting is a method of identifying potential security threats by searching for specific attack techniques…Jan 27, 2023Jan 27, 2023