Jashanpreet SinghDay 7: Generating and Ingesting Telemetry into Wazuh 🚀Hi everyone! 👋Welcome to Day 7 of the 10-Day SOC Automation Challenge! 🎉 If you’ve been following along, we’re diving deeper into our SOC…Oct 24
Yash Pawar @HackersParadiseUsing Mimikatz to Extract HashesMimikatz is commonly used to extract password hashes and credentials from the lsass.exe process, where Windows caches this sensitive…Oct 7Oct 7
cY83rR0H1tinT3CHLSA Protection Bypass/DetectionIn this blog, we will discuss LSA Protection Bypassing using 3 different Methods:-Jul 25Jul 25
Alan vinOSINT TeamDetection For Active Directory Enumeration Tools: Mimikatz and PsexecHi guys i am back with a new blog related to the attack related to Active Directory and detection use case for this. I am using the ELK…Sep 17Sep 17
Jashanpreet SinghDay 7: Generating and Ingesting Telemetry into Wazuh 🚀Hi everyone! 👋Welcome to Day 7 of the 10-Day SOC Automation Challenge! 🎉 If you’ve been following along, we’re diving deeper into our SOC…Oct 24
Yash Pawar @HackersParadiseUsing Mimikatz to Extract HashesMimikatz is commonly used to extract password hashes and credentials from the lsass.exe process, where Windows caches this sensitive…Oct 7
cY83rR0H1tinT3CHLSA Protection Bypass/DetectionIn this blog, we will discuss LSA Protection Bypassing using 3 different Methods:-Jul 25
Alan vinOSINT TeamDetection For Active Directory Enumeration Tools: Mimikatz and PsexecHi guys i am back with a new blog related to the attack related to Active Directory and detection use case for this. I am using the ELK…Sep 17