|
You are here |
bc-security.org | ||
| | | | |
bohops.com
|
|
| | | | | Introduction In recent years, there have been numerous published techniques for evading endpoint security solutions and sources such as A/V, EDR and logging facilities. The methods deployed to achieve the desired result usually differ in sophistication and implementation, however, effectiveness is usually the end goal (of course, with thoughtful consideration of potential tradeoffs). Defenders can... | |
| | | | |
www.darkoperator.com
|
|
| | | | | [AI summary] The provided text discusses various methods to secure PowerShell environments against potential threats, focusing on monitoring, logging, and policy enforcement. It outlines the use of Group Policy to enable module logging, which helps track PowerShell cmdlet activities. The text also covers the use of Software Restriction Policies (SRP) and AppLocker for controlling application execution. Additionally, it mentions the PowerShell v3 feature __PSLockdownPolicy as a tool for restricting PowerShell functionalities. The author emphasizes the importance of planning and testing these security measures in a controlled environment to ensure effectiveness. | |
| | | | |
blog.flanker017.me
|
|
| | | | | Testing Empire as post-exploitation framework in domain environment Due to recent research on Red-Blue Team Operations, I became interested in various post-exploitation framework. Since the widely ... | |
| | | | |
www.strongdm.com
|
|
| | | Zero Trust cloud security is a cybersecurity model that operates on the principle that no user, device, system, or action should be trusted by default... | ||