Welcome to FLARE VM - a fully customizable, Windows-based security distribution for malware analysis, incident response, penetration testing, etc.
https://github.com/mandiant/flare-vm
https://github.com/mandiant/flare-vm
GitHub
GitHub - mandiant/flare-vm: A collection of software installations scripts for Windows systems that allows you to easily setup…
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM. - mandiant/flare-vm
Windows_PowerShell_Tutorial_for_Beginners_9.pdf
240.6 KB
افرادی که در حوزه blue Team کار میکنند، نیاز به دانش در خصوص پاورشل دارند،
یک راهنمای خوب برای کسانی که تازه کارتر هستند
Windows_PowerShell_Tutorial_for_Beginners - Page ۹.pdf
یک راهنمای خوب برای کسانی که تازه کارتر هستند
Windows_PowerShell_Tutorial_for_Beginners - Page ۹.pdf
Blinding EDR On Windows
My understanding of EDRs would not be possible without the help of many great security researchers. Below are some write-ups and talks that really helped me gain the understanding needed and hit the ground running on the research that will be presented here. If you are interested to go deeper, be sure to check out the following research (in no particular order):
https://synzack.github.io/Blinding-EDR-On-Windows/
My understanding of EDRs would not be possible without the help of many great security researchers. Below are some write-ups and talks that really helped me gain the understanding needed and hit the ground running on the research that will be presented here. If you are interested to go deeper, be sure to check out the following research (in no particular order):
https://synzack.github.io/Blinding-EDR-On-Windows/
Red Team Blog
Blinding EDR On Windows
Acknowledgements My understanding of EDRs would not be possible without the help of many great security researchers. Below are some write-ups and talks that really helped me gain the understanding needed and hit the ground running on the research that will…
نگاهی به شکار تهدیدات با بهره گیری sysmon
https://www.darkoperator.com/blog/2018/10/5/operating-offensively-against-sysmon
https://www.darkoperator.com/blog/2018/10/5/operating-offensively-against-sysmon
Shell is Only the Beginning
Operating Offensively Against Sysmon
Sysmon is a tool written by Mark Russinovich that I have covered in multiple blog post and even wrote a PowerShell module called Posh-Sysmon to help with the generation of configuration files for it. Its main purpose is for the tracking of potentially malicious…
#فرصت_همکاری کارشناس تحلیل رخدادهای امنیتی در شرکت پرداخت الکترونیک سداد
- تسلط به مبانی عمومی امنيت اطلاعات (تسلط بر پروتکلهای رمزنگاری، امضا، تبادل کلید و مکانیزمهای کنترل دسترسی)
- تسلط به مفاهیم فرایند رسیدگی به حادثه
- تسلط در تحلیل لاگهای حملات شناسایی شده توسط سیستمهای تشخیص نفوذ، و ضد بدافزار
- تسلط در تحلیل لاگهای حملات شناسایی شده توسط تجهیزات امنیت شبکه در لایههای مختلف
- توانایی شناسایی و تحلیل تغییرات ثبت شده بر روی سیستمها
- آشنا با نحوه عملکرد سامانه SIEM
- آشنا با صنعت پرداخت الکترونیک، حساسیتها و مخاطرات این حوزه
علاقمندان رزومه خود را به ایمیل زیر ارسال نمایند.
🔹 [email protected]
- تسلط به مبانی عمومی امنيت اطلاعات (تسلط بر پروتکلهای رمزنگاری، امضا، تبادل کلید و مکانیزمهای کنترل دسترسی)
- تسلط به مفاهیم فرایند رسیدگی به حادثه
- تسلط در تحلیل لاگهای حملات شناسایی شده توسط سیستمهای تشخیص نفوذ، و ضد بدافزار
- تسلط در تحلیل لاگهای حملات شناسایی شده توسط تجهیزات امنیت شبکه در لایههای مختلف
- توانایی شناسایی و تحلیل تغییرات ثبت شده بر روی سیستمها
- آشنا با نحوه عملکرد سامانه SIEM
- آشنا با صنعت پرداخت الکترونیک، حساسیتها و مخاطرات این حوزه
علاقمندان رزومه خود را به ایمیل زیر ارسال نمایند.
🔹 [email protected]
کتاب رایگان و بی نظیر یادگیری ماشین و علم داده. 490 صفحه.
اگر به دنبال منبع فارسی و رایگان جهت یادگیری علم داده و یادگیری ماشین هستید، این کتاب فوق العاده می تواند منبع بسیار خوبی براتون باشه که مفاهیم رو خیلی خوب و ساده توضیح داده.
لینک دسترسی :
https://www.researchgate.net/publication/358263339_yadgyry_mashyn_w_lm_dadh_mbany_mfahym_algwrytmha_w_abzarha
با هشتگ
#BigDataWorldLearn
به همه ی فایل های آموزشی دسترسی دارید.
🌐 ما را در تلگرام، اینستاگرام و یوتیوب دنبال کنید
اگر به دنبال منبع فارسی و رایگان جهت یادگیری علم داده و یادگیری ماشین هستید، این کتاب فوق العاده می تواند منبع بسیار خوبی براتون باشه که مفاهیم رو خیلی خوب و ساده توضیح داده.
لینک دسترسی :
https://www.researchgate.net/publication/358263339_yadgyry_mashyn_w_lm_dadh_mbany_mfahym_algwrytmha_w_abzarha
با هشتگ
#BigDataWorldLearn
به همه ی فایل های آموزشی دسترسی دارید.
🌐 ما را در تلگرام، اینستاگرام و یوتیوب دنبال کنید
ResearchGate
(PDF) یادگیری ماشین و علم داده: مبانی، مفاهیم، الگوریتمها و ابزارها
PDF | On Feb 1, 2022, Milad Vazan published یادگیری ماشین و علم داده: مبانی، مفاهیم، الگوریتمها و ابزارها | Find, read and cite all the research you need on ResearchGate
PeStudio
PeStudio is a free tool performing the static investigation of any Windows executable binary. A file being analyzed with PeStudio is never launched.
Professional software for reviewing and analyzing file types EXE, DLL, CPL, OCX, AX, SYS, etc.
https://www.winitor.com/
PeStudio is a free tool performing the static investigation of any Windows executable binary. A file being analyzed with PeStudio is never launched.
Professional software for reviewing and analyzing file types EXE, DLL, CPL, OCX, AX, SYS, etc.
https://www.winitor.com/
Backstab - a tool to kill antimalware protected processes
✅Kill EDR Protected Processes
https://hakin9.org/backstab-a-tool-to-kill-antimalware-protected-processes/
✅Kill EDR Protected Processes
https://hakin9.org/backstab-a-tool-to-kill-antimalware-protected-processes/
Hakin9 - IT Security Magazine
404 - Hakin9 - IT Security Magazine
برای علاقمندان به:
SillyRAT - a Cross Platform multifunctional (Windows/Linux/Mac) RAT
https://hakin9.org/sillyrat-a-cross-platform-multifunctional-windows-linux-mac-rat/
SillyRAT - a Cross Platform multifunctional (Windows/Linux/Mac) RAT
https://hakin9.org/sillyrat-a-cross-platform-multifunctional-windows-linux-mac-rat/
Hakin9 - IT Security Magazine
404 - Hakin9 - IT Security Magazine
برای علاقمندان به تست نفوذ
مرحله Covering Tracks👇
Phant0m - Windows Event Log Killer
https://hakin9.org/phant0m-windows-event-log-killer/
مرحله Covering Tracks👇
Phant0m - Windows Event Log Killer
https://hakin9.org/phant0m-windows-event-log-killer/
Hakin9 - IT Security Magazine
404 - Hakin9 - IT Security Magazine
Triage Analysis Tool: DFIR-Trident
In this video, I introduced an excellent tool in the field of triage analysis that at the level of Windows, using the power of PowerShell, we can track events and discover digital documents and evidence.
The name of this Windows PowerShell tool, which is also open source:
Trident
Video language: Persian
https://lnkd.in/e6RTiAad
#dfir
In this video, I introduced an excellent tool in the field of triage analysis that at the level of Windows, using the power of PowerShell, we can track events and discover digital documents and evidence.
The name of this Windows PowerShell tool, which is also open source:
Trident
Video language: Persian
https://lnkd.in/e6RTiAad
#dfir
YouTube
Triage Analysis Tool: DFIR-Trident
In this video, I introduced an excellent tool in the field of triage analysis that at the level of Windows, using the power of PowerShell, we can track events and discover digital documents and evidence.
The name of this Windows PowerShell tool, which is…
The name of this Windows PowerShell tool, which is…
DFIR Tools
👇👇👇
Windows Live Response Collection
یک ابزار عالی برای کارشناسان و متخصصان شبکه و امنیت
اگر تخصص در حوزه Forensics و یا DFIR ندارید ، اما به دنبال بررسی سیستم ها ی سازمان هستید و احتمال آلودگی را می دهید، این ابزار به صورت اتومات تمامی مدارک و شواهد را از روی سیستم ویندوزی استخراج مینماید.
زمان ویدیو: ۱۱ دقیقه
مدرس: مهندس حسینی
لینک مشاهده:
👇👇👇👇👇👇😘
👇👇👇
Windows Live Response Collection
یک ابزار عالی برای کارشناسان و متخصصان شبکه و امنیت
اگر تخصص در حوزه Forensics و یا DFIR ندارید ، اما به دنبال بررسی سیستم ها ی سازمان هستید و احتمال آلودگی را می دهید، این ابزار به صورت اتومات تمامی مدارک و شواهد را از روی سیستم ویندوزی استخراج مینماید.
زمان ویدیو: ۱۱ دقیقه
مدرس: مهندس حسینی
لینک مشاهده:
👇👇👇👇👇👇😘
برای علاقمندان یکم حرفه ای تر
Windows Process injection
https://modexp.wordpress.com/2019/05/25/windows-injection-finspy/
Windows Process injection
https://modexp.wordpress.com/2019/05/25/windows-injection-finspy/
modexp
Windows Process Injection: KernelCallbackTable used by FinFisher / FinSpy
Introduction The surveillance spyware FinFisher, also known as FinSpy, uses what Microsoft called an “interesting and quite unusual” method of process injection via the KernelCallBackTa…
برای علاقمندان و متخصصین RED Team
آموزش تکنیک های فوق العاده تیم قرمزی
مخزن زیر:
https://github.com/CronUp/Awesome-Red-Teaming
آموزش تکنیک های فوق العاده تیم قرمزی
مخزن زیر:
https://github.com/CronUp/Awesome-Red-Teaming
GitHub
GitHub - CronUp/Awesome-Red-Teaming: List of Awesome Red Teaming Resources
List of Awesome Red Teaming Resources. Contribute to CronUp/Awesome-Red-Teaming development by creating an account on GitHub.
DFIR Tools in Windows
n this video, we teach you how to use various forensic tools at the Windows level to track intrusion into the system.
These tools are in the triage stage of analysis and for live analysis
Video duration 2:30
Video language: Persian
Presented by: Saeed Hosseini
https://lnkd.in/eEeABR5g
n this video, we teach you how to use various forensic tools at the Windows level to track intrusion into the system.
These tools are in the triage stage of analysis and for live analysis
Video duration 2:30
Video language: Persian
Presented by: Saeed Hosseini
https://lnkd.in/eEeABR5g
YouTube
DFIR Tools in Windows
In this video, we teach you how to use various forensic tools at the Windows level to track intrusion into the system.
These tools are in the triage stage of analysis and for live analysis
These tools are in the triage stage of analysis and for live analysis
Types of digital data in DFIR
In this video about what kind of information, documents and evidence we should look for in the face of organizational systems and networks or personal systems in case of analysis. In the world of forensic analysis, what kind of information and documents are lost quickly, or what traces can hackers erase, and what information about hacker events and activities remains on the system or network.
So a forensic analyst should be aware of the types of information on digital personal and organizational assets.
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/GaQFUxEAJRU
In this video about what kind of information, documents and evidence we should look for in the face of organizational systems and networks or personal systems in case of analysis. In the world of forensic analysis, what kind of information and documents are lost quickly, or what traces can hackers erase, and what information about hacker events and activities remains on the system or network.
So a forensic analyst should be aware of the types of information on digital personal and organizational assets.
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/GaQFUxEAJRU
YouTube
Types of digital data in DFIR
In this video about what kind of information, documents and evidence we should look for in the face of organizational systems and networks or personal systems in case of analysis. In the world of forensic analysis, what kind of information and documents are…
Incident Response Methodology - part 1
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/T0tPqU3g9Lo
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/T0tPqU3g9Lo
YouTube
Incident Response Methodology - part 1
In this video, I talked about the OoDA disaster response methodology. This excellent methodology discusses how to communicate with the SOC center and interact with it, as well as with various other areas such as threat hunting, threat intelligence, etc.
As…
As…
Incident Response Methodology - part 2
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/rKrMIpWAMRQ
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/rKrMIpWAMRQ
YouTube
Incident Response Methodology - part 2
In this video, I presented the process of responding to disasters in a realistic way and based on experience in different organizations.
This process focused on the triage section in the first place, both at the crime scene and in the laboratory. And then…
This process focused on the triage section in the first place, both at the crime scene and in the laboratory. And then…
Windows Incident Response
The Windows Incident Response Blog is dedicated to the myriad information surrounding and inherent to the topics of IR and digital analysis of Windows systems. This blog provides information in support of my books; "Windows Forensic Analysis" (1st thru 4th editions), "Windows Registry Forensics", as well as the book I co-authored with Cory Altheide, "Digital Forensics with Open Source Tools".
https://lnkd.in/d6wkjWbT
#dfir
The Windows Incident Response Blog is dedicated to the myriad information surrounding and inherent to the topics of IR and digital analysis of Windows systems. This blog provides information in support of my books; "Windows Forensic Analysis" (1st thru 4th editions), "Windows Registry Forensics", as well as the book I co-authored with Cory Altheide, "Digital Forensics with Open Source Tools".
https://lnkd.in/d6wkjWbT
#dfir
Blogspot
Windows Incident Response
The Windows Incident Response Blog is dedicated to the myriad information surrounding and inherent to the topics of IR and digital analysis of Windows systems. This blog provides information in support of my books; "Windows Forensic Analysis" (1st thru 4th…