Browse Skills

Detecting Rootkit Activity

v1.0.0

>

mukul975
5

Detecting Rdp Brute Force Attacks

v1.0.0

Detect RDP brute force attacks by analyzing Windows Security Event Logs for failed authentication patterns (Event ID 4625), successful logons after failures (Event ID 4624), NLA failures, and source IP frequency analysis.

mukul975
3

Detecting Ransomware Precursors In Network

v1.0.0

>

mukul975
3

Detecting Qr Code Phishing With Email Security

v1.0.0

Detect and prevent QR code phishing (quishing) attacks that bypass traditional email security by embedding malicious URLs in QR code images within emails.

mukul975
3

Detecting Process Injection Techniques

v1.0.0

>

mukul975
4

Detecting Process Hollowing Technique

v1.0.0

Detect process hollowing (T1055.012) by analyzing memory-mapped sections, hollowed process indicators, and parent-child process anomalies in EDR telemetry.

mukul975
2

Detecting Privilege Escalation In Kubernetes Pods

v1.0.0

Detect and prevent privilege escalation in Kubernetes pods by monitoring security contexts, capabilities, and syscall patterns with Falco and OPA policies.

mukul975
3

Detecting Privilege Escalation Attempts

v1.0.0

Detect privilege escalation attempts including token manipulation, UAC bypass, unquoted service paths, kernel exploits, and sudo/doas abuse across Windows and Linux.

mukul975
2

Detecting Port Scanning With Fail2ban

v1.0.0

>

mukul975
4

Detecting Pass The Ticket Attacks

v1.0.0

Detect Kerberos Pass-the-Ticket (PtT) attacks by analyzing Windows Event IDs 4768, 4769, and 4771 for anomalous ticket usage patterns in Splunk and Elastic SIEM

mukul975
3

Detecting Pass The Hash Attacks

v1.0.0

Detect Pass-the-Hash attacks by analyzing NTLM authentication patterns, identifying Type 3 logons with NTLM where Kerberos is expected, and correlating with credential dumping.

mukul975
3

Detecting Oauth Token Theft

v1.0.0

>

mukul975
3