what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Akash Sarode

Email addressakky_sanj at yahoo.com
First Active2018-08-10
Last Active2023-08-18
Windows API Exploitation In Real World
Posted Aug 18, 2023
Authored by Akash Sarode

This paper focuses on using Windows APIs to exploit and bypass modern day defense systems. The idea here is to understand the approach of how a modern day threat adversary would definitely help blue teamers to improve their defense mechanism. This article is useful for both blue and red teamers.

tags | paper
systems | windows
SHA-256 | a08987a70023a852cfeef5c85e21b3ba9fa78f1aa30066467583fa799fdca5e3
The Game Of Threat Hunting
Posted May 28, 2021
Authored by Akash Sarode

This paper is focused on the various ways in which threat hunting can be performed. It is based on the author's research of semi-automating the entire process by creating a tool based on machine learning and applying analytics.

tags | paper
SHA-256 | 6af7c1449c75828f7976e682efcd001d246afb3c611194a09d283daac934ebe6
Active Directory Attacks - Red It Out
Posted Nov 9, 2020
Authored by Akash Sarode

This paper is focused on the Active directory attacks and various techniques which can be used by an attacker to abuse an AD environment in an enterprise network. This would also mark an introduction to Active directory along with its components. Topics covered include an introduction to Active Directory, Active Directory Structure, Multiple Attack Phases, Domain Persistence Techniques, Golden Ticket Attack, DCSync Attack, Silver Ticket Attack, and DSRM Attack techniques.

tags | paper
SHA-256 | 44a6dc0147aec02f155b590f92ed64b64954750c17a82f9750df4a42169a6b70
Analysis Using Analytics In Cybersecurity
Posted Aug 8, 2019
Authored by Akash Sarode

This is a brief whitepaper discussing the use of analytics when hunting for threats and notes some open source tools that can provide help.

tags | paper
SHA-256 | 18525786505ac237f2a1eb0774841f333bda5911afa3229941ffeb938eea4c77
Threat Hunting - Hunter Or Hunted
Posted Jun 21, 2019
Authored by Akash Sarode

This whitepaper details methodologies in relation to threat hunting.

tags | paper
SHA-256 | b140c0a2d5b03908ec656abeeecb9c2639808c3de67bc648b07b4db3a813d8de
Machine Learning - Learning Cybersecurity
Posted Aug 10, 2018
Authored by Akash Sarode

Whitepaper called Machine Learning - Learning Cybersecurity.

tags | paper
SHA-256 | 80ab2d27c57df335948cf2475c2f2b380fa6654de6e16605d2716820f2744441
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    0 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close