cissp
16.4K subscribers
955 photos
66 videos
1.73K files
4.8K links
@cissp
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood
Download Telegram
• Carbon Black (formerly Bit9)👌🏽
• CrowdStrike👍🏽👍🏽
• Cybereason👍🏽
• Darktrace👍🏽
• Endgame
• ExtraHop Networks
• Sqrrl (now owned by Amazon)
• Vectra

These are different from breach and attack simulation (BAS) and endpoint detection and response (EDR) solutions, which are designed for reactive security staff.

• Spreadsheets: The simplest threat hunting tool is the humble spreadsheet, which many threat hunters use to help them when carrying out a stack counting exercise to manage the numbers and sort them.

👉Security monitoring tools: Conventional security products such as firewalls, antivirus software, data loss prevention systems, and network intrusion detection systems are all used by threat hunters to help reveal indicators of compromise.

• Statistical analysis tools: These use mathematical patterns to spot anomalous behavior in data, which the threat hunter may then decide warrants further investigation.

• Intelligence analytics tools: These tools help threat hunters visualize data with interactive charts and graphs that make it easier to spot previously hidden correlations and connections between entities, events, or data.

• SIEM systems: Security Information and Event Management (SIEM) solutions are used by threat hunters as well as reactive security staff to make sense of the vast amounts of log data that many organizations generate and to surface suspicious activity.

• User and entity behavior analytics tools: UEBA tools can help threat hunters spot anomalous behavior.

• Threat intelligence resources: As well as tipping threat hunters off about new threats to look for and techniques that attackers are adopting, threat intelligence resources also give details of specific executables or malware hashes to look for and malicious IP addresses to be wary of.
IRM (Incident Response Methodologies):

CERT Societe Generale provides easy to use operational incident best practices. These cheat sheets are dedicated to incident handling and cover multiple fields in which a CERT team can be involved. One IRM exists for each security incident we're used to dealing with.
These cheat sheets have been written in English and Russian, and translated into Spanish by Francisco Neira from the OAS.
CERT Societe Generale would like to thank SANS and Lenny Zeltser who have been a major source of inspiration for some IRMs

https://github.com/certsocietegenerale/IRM
Udemy - Practical Ethical Hacking -(The Complete Course)

https://mega.nz/folder/uh0EAAyC#ti9NxpJpn6WSWw0ABjh8Tw
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part01.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part02.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part03.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part04.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part05.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part06.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part07.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part08.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part09.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part10.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part11.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
Forwarded from Get Public Link Bot
Got File,

💾 Hackin9-courses.18.2.part12.rar

📥 1 GB

🚀 Generate Resumable Link

ℹ️ Use Instant Download Links for Small Files!

@GetPublicLinkBot

⚠️ Instant Links May be having issues! Use Resumable links to download FAQ Link
List of Attack Vectors:
http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp

+

overlooked, critical mistake

1-Running a SOC without business context 👍🏽

2-No Need 2 Believing certifications will bring all the knowledge your SOC and team needs
😅
https://simulation.comptia.org/

😇
Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
https://github.com/StreisandEffect/streisand

+
Section: Threat Hunting
Module 1 : Introduction to Threat Hunting
Module 2 : Threat Hunting Terminology
Module 3 : Threat Intelligence
Module 4 : Threat Hunting Hypothesis
Section: Hunting the Network: Network Analysis
Module 1 : Introduction to Network Hunting
Module 2 : Suspicious Traffic Hunting
Module 3 : Hunting Web Shells
Section: Hunting the Endpoint: Endpoint Analysis
Module 1 : Introduction to Endpoint Hunting
Module 2 : Malware Overview
Module 3 : Hunting Malware
Module 4 : Event IDs, Logging, & SIEMs
Module 5 : Hunting with PowerShell
https://www.elearnsecurity.com/course/threat_hunting_professional/