Popular Posts
-
Initial access: This basically means how an attacker gets into your environment. its the first step where an attacker tries to gain entry in...
-
Reconnaissance Some guard duty findings types related to reconnaissance are below. AWS GuardDuty detects a wide range of suspicious or mal...
-
Ramya is an intelligent and ambitious young woman with a deep passion for creating websites and a talent for crafting beautiful wool product...
-
The Basics of DNS: The Internet's Address Book Imagine if every time you wanted to call a friend, you had to remember their exact 10-d...
-
Active Directory is like the brain of an organization’s network. It’s a system developed by Microsoft to: Store Information about objects ...
-
The I nternet began in the late 1960s, funded by the U.S. Department of Defense as a project called ARPANET. The goal was to create a netwo...
-
Execution : Adversaries/ Attacker run malicious code on target system, this is one of the most important tactic. It's a calm Tuesday e...
-
Story Logs Townhall city Townhall city logs
-
Persistence: Adversaries/attackers are trying to remain inside your system even after you remove them. After the attacker gains access, they...
-
Zone files are plain text files that store information about a specific domain's DNS configuration. They are part of the Domain Name Sys...