Links to additional resources
- Privilege Escalation ESC1
- Privilege Escalation ESC 2 & 3
- Privilege Escalation ESC 4
- Privilege Escalation ESC8
- SpecterOps Whitepaper
- SpecterOps Blog
- Threat Hunter Playbook
- Atomic Purple Team
- Top 10 Reasons You Got Hacked
- How to Applied Purple Teaming Lab Build
- Atomic Red Team Class
- Mitre Att&ck
- .NET Hijacking
- https://www.blackhillsinfosec.com/finding-buried-treasure-in-server-message-block-smb/
- https://github.com/SnaffCon/Snaffler
- Defense Basics with an Azure Lab
- RPC Firewall
- Offensive Basics with an Azure Lab
- SMB Relay
- Bypass NTLM Message Integrity Check
- Shadow Credential
- Coercion & Relays Webcast 🎦
- SCCM Exploitation Webcast
- SCCM Exploitation Slides 🎦
- MITM6
- Parsing Sysmon Logs on Sentinel
- 3 Detections to use to catch adversarial activities early
- Auditing Changes to msDSKeyCredentialLink
- Community Guide
- Sysmon Modular
- Sysmom-KQL Parser
- Attribution
- Sysmon Event ID Breakdown
- Event IDs
- Catch Cobalt Strike with Sentinel
- Azure Security Basics
- Windows Optics
- https://www.blackhillsinfosec.com/your-browser-is-not-a-safe-space/
- Know the Unknows (Breach Data) 🎦
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-193a
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-326a
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-059a
- https://www.blackhillsinfosec.com/forwarding-traffic-through-ssh/
- https://www.blackhillsinfosec.com/how-to-put-yourself-out-there/
- https://www.blackhillsinfosec.com/john-strands-5-phase-plan/
- https://cyberisfull.com/
- https://www.hackthebox.com/ 🥼
- https://tryhackme.com/ 🥼
- https://metactf.com/ 🥼
- Your 5 Year Path: Success in Infosec 🎦
- https://www.blackhillsinfosec.com/small-medium-business-security-strategies-part-1-introduction/
- https://www.blackhillsinfosec.com/small-medium-business-security-strategies-part-2-inventory/
- https://www.blackhillsinfosec.com/small-and-medium-business-security-strategies-part-3-inventory-part-2-software/
- https://www.blackhillsinfosec.com/small-and-medium-business-security-strategies-part-4-csc-3-vulnerability-management/
- https://www.blackhillsinfosec.com/small-and-medium-business-security-strategies-part-5/