Latest Posts:

_OVERVIEW

In this guide i will be writing a detection rule for ICMP pings.

let’s start with a visualization of how the rules should be written in snort:

SNORT

Read More

_OVERVIEW

In T1003.008, Attackers dumps /etc/shadow, and /etc/passwd files. Which are highly Sensitive files that contain the hashes of user passwords, the attacker will then have to crack their hashes offline to obtain the passwords for all users on the compromised machine. In this short post, i’ll be simulating this attack and detecting it using Wazuh and Atomic red team.

T1003.008

TECHNIQUE MAPPING

for this lab I’m using 3 machines, one acting as the server hosting my wazuh dashboard, target that runs Ubuntu, and Kali Linux machine with invoke atomic, I will be invoking the technique on the victim machine and run Atomic on the target system.

Read More
⬆︎TOP