79 results found for basic
79 results found for basic:
Basic Authentication Versus CSRF
I was recently involved in an engagement where access was controlled by Basic Authentication. One (1) of the findings I discovered was a Cross-Site Request Forgery (CSRF) vulnerability. The client was unsure of the best approach to prevent CSRF in…
BEC Basics: Your First Step to Thwarting Email Scams
Learn to identify and combat business email compromise (BEC) threats in Microsoft 365 with expert Steven Erwin and Caroline Fenstermacher.
Social Engineering Basics: How to Win Friends and Infiltrate Businesses
Understanding social engineering tactics and how to defend against physical breaches, with expert insights to enhance security awareness and employee education, from a renowned security expert, John Smith.
Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene
Assess and prioritize your cybersecurity posture with industry-proven best practices, including internal asset discovery, internet-exposed assets, baselining, and robust incident response planning.
Cyber Security Interviews – #086 – Dave Kennedy: The Basics Are Still Challenging
Social-Engineer Toolkit (https://github.com/trustedsec/social-engineer-toolkit) (SET), Artillery, Unicorn, PenTesters Framework, and several popular open-source tools.
David was the co-founder of DerbyCon (https://en.wikipedia.org/wiki/DerbyCon) ;…
Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene—Part 2
In the first Back to Basics blog we discussed cyber hygiene and some fundamental security practices one can take to quickly assess their current cybersecurity posture and identify, prioritize, and mitigate visibility gaps. This post focuses on…
Unleashing the Power of AppLocker: How to Get Started and Go Beyond the Basics
Learn how to build a powerful AppLocker policy, stopping ransomware and automated attacks, and identify weaknesses in your configuration with expert guidance.
Artillery 0.2 Alpha has been released!
Artillery 0.2 Alpha released, adding basic Windows support with fake port creation, anti-dos prevention, and improved security testing tools.
NPS PAYLOAD
NPS Payload will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources.
Developing with VBA for Script Kiddies
Master VBA: Unlock the Power of Visual Basic for Applications to Automate and Customize Microsoft Office Applications