Exploit Jenkins Deserialization CVE-2016-0792 to Test Endpoint Detection Response
Testing Endpoint Detection Response Products This is the first of many posts on how to test […]
Testing Endpoint Detection Response Products This is the first of many posts on how to test […]
Below are some questions I like to ask folks during interviews. I think these questions lead […]
Here is a list of the SHA256 IOCs related to Sunburst as reported by Kim Zetter:
I couldn’t find a good set of Grok rules for the CrowdStrike SIEM connector so I […]
Password Spraying Finding the source of Windows password spraying attacks can be daunting as the Event […]
Problem You are using the MISP cloud base image and receive error “Error: an internal error […]
I kept receiving an “API error” when attempting to run TheHive Project Cortex Analyzer for IBM […]
Code loop through a range of IPs and query McAfee epo on client machines # Loop […]
When you export your bookmarks from Chrome and Firefox the resulting HTML looks pretty plain. Exported […]
To convert a json file to CSV you will need a linux program called jq. INPUTFILE=”inputfile-with-json” […]