Windows auditing mindmap.
Windows auditing mindmap provides a simplified view of Windows Event logs and auditing capacities that enables defenders to enhance visibility for different purposes:
• Log collection (eg: into a SIEM);
• Threat hunting;
• Forensic / DFIR;
• Troubleshooting.
🧷 https://github.com/mdecrevoisier/Windows-auditing-mindmap
#mindmap #Blue_Team
Windows auditing mindmap provides a simplified view of Windows Event logs and auditing capacities that enables defenders to enhance visibility for different purposes:
• Log collection (eg: into a SIEM);
• Threat hunting;
• Forensic / DFIR;
• Troubleshooting.
🧷 https://github.com/mdecrevoisier/Windows-auditing-mindmap
#mindmap #Blue_Team
GitHub
GitHub - mdecrevoisier/Microsoft-eventlog-mindmap: Set of Mindmaps providing a detailed overview of the different #Microsoft auditing…
Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,... - mdecrevoisier/Microsoft-eventlog-mindmap
Windows auditing mindmap.png
1 MB
Windows auditing mindmap.
• Windows auditing mindmap provides a simplified view of Windows Event logs and auditing capacities that enables defenders to enhance visibility for different purposes:
https://github.com/mdecrevoisier/Windows-auditing-mindmap
#mindmap #Windows
• Windows auditing mindmap provides a simplified view of Windows Event logs and auditing capacities that enables defenders to enhance visibility for different purposes:
•
Log collection (eg: into a SIEM).•
Threat hunting.•
Forensic / DFIR.•
Troubleshooting.https://github.com/mdecrevoisier/Windows-auditing-mindmap
#mindmap #Windows
"Network Nightmare" Mindmap.
It is a mindmap for conducting network attacks. For the most part, it will be useful to pentesters or red team operators.
https://github.com/c4s73r/NetworkNightmare/blob/main/NetworkNightmare_by_Caster.pdf
#Mindmap #Red_team
It is a mindmap for conducting network attacks. For the most part, it will be useful to pentesters or red team operators.
•
Traffic Hijacking;•
MiTM Attacks;•
Dynamic IGP Routing;•
Configuration Exfiltration;•
DoS;•
NAC/802.1X Bypassing;•
GRE Pivoting;•
Cisco EEM for hiding user;•
Authentication Cracking;•
Information Gathering;•
Cisco Passwords;•
VLAN Bypassing.https://github.com/c4s73r/NetworkNightmare/blob/main/NetworkNightmare_by_Caster.pdf
#Mindmap #Red_team
Forwarded from infosec
CISO_Mindmap_23.pdf
874.5 KB