BTFM - 01 - Preparation
This article covers some of the documents, workflows, and frameworks you should have in place to have a solid security program for your organization.
This article covers some of the documents, workflows, and frameworks you should have in place to have a solid security program for your organization.
This article covers the use cases for Nmap for the purpose of network discovery.
This article covers vulnerability scanning with Nessus for the purpose of identifying threats in your environment.
This article covers vulnerability scanning with OpenVas for the purpose of identifying threats in your environment.
This article covers auditing DHCP logs.
This article covers auditing DNS logs.
This article covers file hashing in Windows.
This article covers enumerating NetBIOS information in WIndows.
This article covers auditing User Activity using PSTools.
This article covers auditing User Activity, conducting password checks.
This article covers auditing Windows Active Directory Inventory.
This article covers enumerating file shares in Linux.
This article covers executing a simple ping scan
This article covers auditing DHCP logs in Linux.
This article covers auditing DNS logs in Linux.
This article covers file hashing in Linux.
This article covers executing a NetBIOS scan in Linux.
This article covers conducting password checks in Linux.
This article covers managing Windows services.
This article covers managing Windows Defender (Firewall).
This article covers remote password resets
This article covers working with the Hosts file and DNS.
This article covers using AppLocker to allow or deny applications in a Windows environment.