Browse Skills

Detecting Azure Lateral Movement

v1.0.0

Detect lateral movement in Azure AD/Entra ID environments using Microsoft Graph API audit logs, Azure Sentinel KQL hunting queries, and sign-in anomaly correlation to identify privilege escalation, token theft, and cross-tenant pivoting.

mukul975
5

Detecting Azure Storage Account Misconfigurations

v1.0.0

Audit Azure Blob and ADLS storage accounts for public access exposure, weak or long-lived SAS tokens, missing encryption at rest, disabled HTTPS-only traffic, and outdated TLS versions using the azure-mgmt-storage Python SDK.

mukul975
3

Detecting Business Email Compromise With Ai

v1.0.0

Deploy AI and NLP-powered detection systems to identify business email compromise attacks by analyzing writing style, behavioral patterns, and contextual anomalies that evade traditional rule-based filters.

mukul975
3

Detecting Container Escape Attempts

v1.0.0

Container escape is a critical attack technique where an adversary breaks out of container isolation to access the host system or other containers. Detection involves monitoring for escape indicators

mukul975
3

Detecting Container Escape With Falco Rules

v1.0.0

Detect container escape attempts in real-time using Falco runtime security rules that monitor syscalls, file access, and privilege escalation.

mukul975
2

Detecting Credential Dumping Techniques

v1.0.0

Detect LSASS credential dumping, SAM database extraction, and NTDS.dit theft using Sysmon Event ID 10, Windows Security logs, and SIEM correlation rules

mukul975
6

Detecting Dcsync Attack In Active Directory

v1.0.0

Detect DCSync attacks where adversaries abuse Active Directory replication privileges to extract password hashes by monitoring for non-domain-controller accounts requesting directory replication via DsGetNCChanges.

mukul975
3

Detecting Email Account Compromise

v1.0.0

Detect compromised O365 and Google Workspace email accounts by analyzing inbox rule creation, suspicious sign-in locations, mail forwarding rules, and unusual API access patterns via Microsoft Graph and audit logs.

mukul975
3

Detecting Email Forwarding Rules Attack

v1.0.0

Detect malicious email forwarding rules created by adversaries to maintain persistent access to email communications for intelligence collection and BEC attacks.

mukul975
2

Detecting Privilege Escalation In Kubernetes Pods

v1.0.0

Detect and prevent privilege escalation in Kubernetes pods by monitoring security contexts, capabilities, and syscall patterns with Falco and OPA policies.

mukul975
3

Detecting Qr Code Phishing With Email Security

v1.0.0

Detect and prevent QR code phishing (quishing) attacks that bypass traditional email security by embedding malicious URLs in QR code images within emails.

mukul975
3

Detecting Rdp Brute Force Attacks

v1.0.0

Detect RDP brute force attacks by analyzing Windows Security Event Logs for failed authentication patterns (Event ID 4625), successful logons after failures (Event ID 4624), NLA failures, and source IP frequency analysis.

mukul975
3