Skip to content
-
Security You Can Trust, Expertise You Can Rely On. TekGenX Consulting
NetwerkLABS

Powered By TEKGENX CONSULTING

  • Home
  • BLUE TEAM
    • MITRE ATT&CK
    • INFOSEC Governance and Regulation
      • NIST
        • IDENTIFY
        • PROTECT
        • DETECT
        • RESPOND
        • RECOVER
      • Risk Management
    • SOC
      • Threat Detection and Incident Response
        • Threat Detection EngineeringA practical course on Threat Detection Engineering using Elastic SIEM/EDR
        • Threat Hunting
          • Traffic Analysis
        • Splunk
          • Splunk Basics
          • Understanding Log Sources
          • Dashboards and Reports
          • Exploring SPL
          • Incident Handling with Splunk
          • Investigating with Splunk
    • Security+
    • Scripting
      • Bash Scripting
      • Python
      • ZyBER-TOOLS
  • ZyBER-SERIES
    • Wazuh – SIEM and XDRThe Open Source Security Platform that provides Unified XDR and SIEM protection for endpoints and cloud workloads
    • Attack and Defend Active Directory
    • Offensive Testing Enterprise Networks
    • Threat Detection EngineeringA practical course on Threat Detection Engineering using Elastic SIEM/EDR
    • F5 Local Traffic Manager (LTM)F5 Local Traffic Manager (LTM)
    • Incident Response and Forensics
    • Red Team Engagements
  • ZyBER-INTEL
  • ZyBER-NEWS
  • Cookie Policy (EU)
Subscribe

Posts by Bharath Narayanasamy

  • Home
  • Bharath Narayanasamy
  • Page 13
Avatar photo
About Bharath Narayanasamy
Bharath Narayanasamy is the principal cybersecurity consultant at TekGenX, specializing in offensive security, detection engineering, incident response, and GRC. Certified in CySA+, eJPTv2, Security+, CCNA, CCSA, and ISO 27001 Lead Implementer & Lead Auditor, he delivers end-to-end security solutions that transform complex requirements into measurable, resilient outcomes.
Posted inPrivilege Escalation

Linux Privilege Escalation Techniques

Linux privilege escalation techniques involve methods that allow a user to gain higher privileges or escalate their existing privileges to gain unauthorized access or perform actions they wouldn't typically be…
Read More
Posted by Avatar photo Bharath Narayanasamy
Posted inThreat Hunting Threat Detection and Incident Response

Splunk Threat Hunting – Windows Events

When performing threat hunting using Splunk on Windows systems, there are several important queries you can use to identify potential threats and security incidents. Here are some examples: Detecting Suspicious…
Read More
Posted by Avatar photo Bharath Narayanasamy
Posted inThreat Detection and Incident Response

Windows Event IDs to monitor/investigation

SOC (Security Operations Center) teams typically monitor various Windows event IDs to detect and respond to security incidents. While the specific event IDs may vary depending on the organization's security…
Read More
Posted by Avatar photo Bharath Narayanasamy
Posted inPrivilege Escalation

Privilege Escalation – WINDOWS

Post Exploit Enumeration # Basics systeminfo hostname systeminfo | findstr /B /C:"OS Name" /C:"OS Version" # Who am I? whoami echo %username% # What users/localgroups are on the machine? net…
Read More
Posted by Avatar photo Bharath Narayanasamy
Posted inEnumeration

CrackMapExec Cheat Sheet

Read More
Posted by Avatar photo Bharath Narayanasamy
Posted inCisco ISE

Cisco ISE licensing

Cisco ISE licenses Source: Cisco Evaluation Cisco ISE, upon installation, grants a 90-day Evaluation license that supports 100 endpoints and enables all Cisco ISE features. You can set up a…
Read More
Posted by Avatar photo Bharath Narayanasamy
Posted inVulnLAB Practical LABS

VulnHUB PwnBox-init: Walkthrough

Lab setup Enumeration Nmap scan └─$ nmap -sC -sV -p- -A -T5 172.16.1.116 -oN pwnbox.txt Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-01 16:21 CEST Nmap scan report for 172.16.1.116…
Read More
Posted by Avatar photo Bharath Narayanasamy
Posted inPrivilege Escalation

Linux Privilege Escalation: The PATH Environment Variable (PATH Abuse)

LAB setup Attack Box: KALI Linux or ParrotOS Victim machine: VulnHUB VM: OS-Bytesec Initial Access Read this article to learn how to gain initial access to the victim machine. SSH…
Read More
Posted by Avatar photo Bharath Narayanasamy
Posted inPenTest Privilege Escalation

Linux Privilege Escalation

Privilege escalation is all about: Collect - Enumeration, more enumeration and some more enumeration. Process - Sort through data, analyse and prioritisation. Search - Know what to search for and…
Read More
Posted by Avatar photo Bharath Narayanasamy
Posted inEnumeration Cheat Sheets

LINUX 101

Linux File System PathDescription/The top-level directory is the root filesystem and contains all of the files required to boot the operating system before other filesystems are mounted as well as…
Read More
Posted by Avatar photo Bharath Narayanasamy

Posts pagination

Previous page 1 … 11 12 13 14 15 … 17 Next page

Recent Posts

  • The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: II)
  • The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: I)
  • RED Teaming: Mythic C2 Framework
  • Installing OpenBAS: The OpenSource Breach and Attack Simulation
  • Metasploit Framework (MSFconsole) Cheatsheet

Categories

AD AD attacks brute-force caldera dfir drupal Elastic linux LTM NIST red-team SIEM snort splunk Threat Intel threat_detection Threat_hunting vulnhub wazuh wireshark

Copyright 2025 — NetwerkLABS. Powered by TekGenX Consulting. All rights reserved.
Scroll to Top

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by