Browse Skills

Detecting Misconfigured Azure Storage

v1.0.0

>

mukul975
3

Detecting Modbus Command Injection Attacks

v1.0.0

>

mukul975
5

Detecting Modbus Protocol Anomalies

v1.0.0

>

mukul975
4

Detecting Network Anomalies With Zeek

v1.0.0

>

mukul975
2

Detecting Network Scanning With Ids Signatures

v1.0.0

Detect network reconnaissance and port scanning using Suricata and Snort IDS signatures, threshold-based detection rules, and traffic anomaly analysis to identify Nmap, Masscan, and custom scanning activity.

mukul975
2

Detecting Oauth Token Theft

v1.0.0

>

mukul975
3

Detecting Pass The Hash Attacks

v1.0.0

Detect Pass-the-Hash attacks by analyzing NTLM authentication patterns, identifying Type 3 logons with NTLM where Kerberos is expected, and correlating with credential dumping.

mukul975
3

Detecting Pass The Ticket Attacks

v1.0.0

Detect Kerberos Pass-the-Ticket (PtT) attacks by analyzing Windows Event IDs 4768, 4769, and 4771 for anomalous ticket usage patterns in Splunk and Elastic SIEM

mukul975
3

Detecting Port Scanning With Fail2ban

v1.0.0

>

mukul975
4

Detecting Privilege Escalation Attempts

v1.0.0

Detect privilege escalation attempts including token manipulation, UAC bypass, unquoted service paths, kernel exploits, and sudo/doas abuse across Windows and Linux.

mukul975
2

Detecting Process Hollowing Technique

v1.0.0

Detect process hollowing (T1055.012) by analyzing memory-mapped sections, hollowed process indicators, and parent-child process anomalies in EDR telemetry.

mukul975
2

Detecting Process Injection Techniques

v1.0.0

>

mukul975
4