Home
Unf0rG1v3n
Cancel

LDAP Monitoring with AMA and Microsoft Sentinel

According to Microsoft. LDAP is “an application protocol for working with various directory services. Directory services, such as Active Directory, store user and account information, and security ...

Adding the Docker Build and Publish Stage in a Pipeline

This is part from the course of Linux Foundation called Implementing DevSecOps and it’s given by initcron. In a development environment, you can build an image with Docker. However, in a Continuou...

Deploying a Cloud Environment for DevSecops

For this case, we are going to use Google Cloud. There, a Kubernetes cluster will be created, Linux environment for development will be also created, and Jenkins will be deployed within Kubernetes....

Analyzing Packets with Wireshark and Python

Some cases, as a analysts we need to review network packets to find the root cause of an error or incident. for this reason, in this post we’re going to analyze packets using wireshark and see if w...

Deploying Wazuh in a home lab

In this post we’re going to deploy Wazuh. According to its website, Wazuh is is a free and open source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-pre...

How to Configure CIS Compliance Report in Nessus

Vulnerability scanner is a system designed to assess computers, networks or applications for known weaknesses. This system is a key part in any security program because we can automate those scans ...

(ESP) Administracion de cuentas locales en el Directorio Activo con LAPS

En ambientes empresariales es dificil realizar una administracion adecuada de las cuentas locales. Por ello, Microsoft tiene una herramienta gratuita llamada LAPS para administrar automaticamente l...

Linux Authentication with Active Directory

This is a tutorial to access with an Active Directory user in a linux server. For this tutorial we have the following devices: Active Directory Server: IP 10.0.0.4 Linux Server: IP 10.0.0.5 ...

Monitoring Powershell commands with Elastic Stack

In some cases it’s important to monitor all the powershell commands executed in a windows server because it can help us to alert possible attacks and lateral movements. For that reason, in this pos...

Visualizing Windows VM access in the Microsoft Sentinel map

In the previous post we deployed Microsoft Sentinel with the connector to gather data from the Windows VM. Now, we can explore some workbooks to see pre-defined dashboards for example, we can us...