Windows Account Types
Popular Posts
-
Execution : Adversaries/ Attacker run malicious code on target system, this is one of the most important tactic. It's a calm Tuesday e...
-
For Linux Systems: SSH Failed Logins: This gets triggered when someone tries to log into a Linux server via SSH (for example, using PuTTY)...
-
Story Logs Townhall city Townhall city logs
-
Initial access: This basically means how an attacker gets into your environment. its the first step where an attacker tries to gain entry in...
-
The Basics of DNS: The Internet's Address Book Imagine if every time you wanted to call a friend, you had to remember their exact 10-d...
-
T shark - TShark is the command-line version of Wireshark It performs similar network packet capture and analysis functions but withou...
-
Persistence: Adversaries/attackers are trying to remain inside your system even after you remove them. After the attacker gains access, they...
-
Reconnaissance Some guard duty findings types related to reconnaissance are below. AWS GuardDuty detects a wide range of suspicious or mal...
-
🔐 Welcome to Security Manadhey Step into the world of real-world cybercrime investigations! 🕵️♀️ What We Offer: Access to simulate...
-
In the Windows operating system, the nslookup command is used to query DNS records. For example, to query the DNS A record for a domain, u...