Posted inRED TEAM
THREAT EMULATION: Introduction
Purpose of Threat Emulation Threat emulation is meant to assist security teams and organisations, in general, in better understanding their security posture and their defence mechanisms and performing due diligence…
Posted inZyberAttacks
Decoding
Most commonly used text encoding methods: base64 hex rot13 Base64 Identifying Base64: base64 encoded strings are easily spotted since they only contain alpha-numeric characters. However, the most distinctive feature of base64 is its…
Code Obfuscation and Deobfuscation
Code Obfuscation is a technique used to make a script more difficult to read by humans but allows it to function the same from a technical point of view, though…
Incident Response
Incident response, also known as incident handling, is a cyber security function that uses various methodologies, tools and techniques to detect and manage adversarial attacks while minimizing impact, recovery time…
Remote Monitoring and Management software used in phishing attacks
RMM software used in phishing attacks Remote Monitoring & Management (RMM) software, including popular tools like AnyDesk, Atera, and Splashtop, are invaluable for IT administrators today, streamlining tasks and ensuring…
Incident Report Template
Elements of an incident report Source: Hack The Box Incident Report Template






