Browse Skills
Building Vulnerability Exception Tracking System
v1.0.0Build a vulnerability exception and risk acceptance tracking system with approval workflows, compensating controls documentation, and expiration management.
Collecting Indicators Of Compromise
v1.0.0>
Collecting Open Source Intelligence
v1.0.0>
Collecting Threat Intelligence With Misp
v1.0.0MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform for gathering, sharing, storing, and correlating Indicators of Compromise (IOCs) of targeted attacks, threat
Collecting Volatile Evidence From Compromised Host
v1.0.0Collect volatile forensic evidence from a compromised system following order of volatility, preserving memory, network connections, processes, and system state before they are lost.
Conducting Domain Persistence With Dcsync
v1.0.0Perform DCSync attacks to replicate Active Directory credentials and establish domain persistence by extracting KRBTGT, Domain Admin, and service account hashes for Golden Ticket creation.
Conducting External Reconnaissance With Osint
v1.0.0>
Conducting Internal Network Penetration Test
v1.0.0Execute an internal network penetration test simulating an insider threat or post-breach attacker to identify lateral movement paths, privilege escalation vectors, and sensitive data exposure within the corporate network.
Conducting Memory Forensics With Volatility
v1.0.0>
Conducting Network Penetration Test
v1.0.0>
Conducting Wireless Network Penetration Test
v1.0.0>
Configuring Aws Verified Access For Ztna
v1.0.0Configure AWS Verified Access to provide VPN-less zero trust network access to internal applications using identity and device posture verification with Cedar policy language.