Found 699 skills for "mukul975" Page 21 of 59

detecting-lateral-movement-with-splunk

When hunting for adversary movement between compromised systems After detecting credential theft to trace subsequent lateral activity When investigati...

github 8 files

detecting-lateral-movement-with-zeek

Analyze Zeek network logs to identify lateral movement techniques including SMB admin share access, DCE/RPC remote service creation, NTLM account spra...

github 8 files

detecting-living-off-the-land-attacks

Monitor for suspicious use of legitimate Windows binaries (LOLBins) including certutil, mshta, rundll32, regsvr32, and others used in fileless and liv...

github 4 files

detecting-living-off-the-land-with-lolbas

Living Off the Land Binaries, Scripts, and Libraries (LOLBAS) are legitimate system utilities abused by attackers to execute malicious actions while e...

github 4 files

exploiting-type-juggling-vulnerabilities

When testing PHP web applications for authentication bypass vulnerabilities During assessment of password comparison and hash verification logic When ...

github 4 files

exploiting-websocket-vulnerabilities

During authorized penetration tests when the application uses WebSocket connections for real-time features When assessing chat applications, live noti...

github 4 files

hardening-docker-daemon-configuration

The Docker daemon (dockerd) runs with root privileges and controls all container operations. Hardening its configuration through /etc/docker/daemon.js...

github 8 files

hunting-advanced-persistent-threats

Use this skill when: Conducting proactive threat hunting sprints (typically 2–4 week cycles) based on newly published APT intelligence A UEBA alert or...

github 4 files

hunting-for-anomalous-powershell-execution

PowerShell Script Block Logging (Event ID 4104) records the full deobfuscated script text executed on a Windows endpoint, making it the primary data s...

github 4 files

hunting-for-beaconing-with-frequency-analysis

When proactively searching for compromised endpoints calling back to C2 infrastructure After threat intelligence reports indicate active C2 frameworks...

github 8 files

detecting-network-scanning-with-ids-signatures

Network scanning is typically the first phase of an attack, where adversaries enumerate live hosts, open ports, running services, and OS versions usin...

github 4 files

executing-active-directory-attack-simulation

Assessing the security of an Active Directory domain and forest against common and advanced attack techniques Identifying attack paths from low-privil...

github 4 files