Jashanpreet SinghDay 7: Generating and Ingesting Telemetry into Wazuh 🚀Hi everyone! 👋Welcome to Day 7 of the 10-Day SOC Automation Challenge! 🎉 If you’ve been following along, we’re diving deeper into our SOC…Oct 24
InT3CHbycY83rR0H1tLSA Protection Bypass/DetectionIn this blog, we will discuss LSA Protection Bypassing using 3 different Methods:-Jul 25Jul 25
Adel MohamedHacking the domain admin account using Mimikatz tool — “Pass the Hash”IntroductionFeb 17Feb 17
Jashanpreet SinghDay 7: Generating and Ingesting Telemetry into Wazuh 🚀Hi everyone! 👋Welcome to Day 7 of the 10-Day SOC Automation Challenge! 🎉 If you’ve been following along, we’re diving deeper into our SOC…Oct 24
InT3CHbycY83rR0H1tLSA Protection Bypass/DetectionIn this blog, we will discuss LSA Protection Bypassing using 3 different Methods:-Jul 25
RichMimikatz CheatsheetTL;DR Mimikatz cheatsheet of things I have found useful in CRTP and the lab.Aug 26, 2022
InSystem WeaknessbyMaruf Farhan RiganGolden Ticket Heist: Stealing the Keys to the KingdomGolden Ticket Attack:Jan 15
Ryan YagerInvoke-Mimikatz WalkthroughToday we are going to be looking at Invoke-Mimikatz which can be found here:Sep 26, 2022