ParitoshPurple Teaming: Bridging the Gap Between Red and Blue TeamsIn cybersecurity, organizations are continuously seeking innovative strategies to enhance their security posture. One such approach that…Jul 21
Rahul HoysalaTryHackMe: Advent of Cyber 2024: Day 1 WriteupHello and welcome to TryHackMe’s Advent of Cyber 2024! This is a set of beginner-friendly cybersecurity challenges — one for each day…Dec 1
InInfoSec Write-upsbyKostasUnderstanding Red to Be Better at Blue: Navigating New CrackMapExec UpdatesHow to research and develop detection and hunting techniques based on new features from commonly-used penetration testing frameworks.Sep 5, 2023Sep 5, 2023
Cyb3rtHow To Detect Remote Desktop Protocol tunneling over SSHDuring some testing on my Windows VPS, I was checking out the OpenSSH server feature in Windows. This reminded me about the times our Red…Aug 3, 20221Aug 3, 20221
delivr.toA Consultant’s Guide to delivr.toHarness the power of delivr.to and validate your client’s email security by demonstrating exactly what can land in their inboxes.Aug 15, 2023Aug 15, 2023
ParitoshPurple Teaming: Bridging the Gap Between Red and Blue TeamsIn cybersecurity, organizations are continuously seeking innovative strategies to enhance their security posture. One such approach that…Jul 21
Rahul HoysalaTryHackMe: Advent of Cyber 2024: Day 1 WriteupHello and welcome to TryHackMe’s Advent of Cyber 2024! This is a set of beginner-friendly cybersecurity challenges — one for each day…Dec 1
InInfoSec Write-upsbyKostasUnderstanding Red to Be Better at Blue: Navigating New CrackMapExec UpdatesHow to research and develop detection and hunting techniques based on new features from commonly-used penetration testing frameworks.Sep 5, 2023
Cyb3rtHow To Detect Remote Desktop Protocol tunneling over SSHDuring some testing on my Windows VPS, I was checking out the OpenSSH server feature in Windows. This reminded me about the times our Red…Aug 3, 20221
delivr.toA Consultant’s Guide to delivr.toHarness the power of delivr.to and validate your client’s email security by demonstrating exactly what can land in their inboxes.Aug 15, 2023
Duncan Proffitt“The smyler with the knyf under the cloke” — The collaborative purple conflict.Offensive Security or “Red” Teams & Security Operations Centres, or “Blue” teams (SOCs), when working harmoniously, exemplify the unity…Jan 13
InDetect FYIbyTho LePurple teaming — Understand PivotingPivoting is a crucial step in the adversaries’ strategies to further compromise a targeted environment and bypass strong perimeter…Aug 6, 2023
InITSEC Asia — Research & TechnologybyRizky SatrioZeek Script Example For Detecting DNS DDoS AttackIn this article, I will explain about creating custom Zeek Script to send Notice for specific criteria.Aug 28, 2022