what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Akash Sarode

Email addressakky_sanj at yahoo.com
First Active2018-08-10
Last Active2023-08-18
Windows API Exploitation In Real World
Posted Aug 18, 2023
Authored by Akash Sarode

This paper focuses on using Windows APIs to exploit and bypass modern day defense systems. The idea here is to understand the approach of how a modern day threat adversary would definitely help blue teamers to improve their defense mechanism. This article is useful for both blue and red teamers.

tags | paper
systems | windows
SHA-256 | a08987a70023a852cfeef5c85e21b3ba9fa78f1aa30066467583fa799fdca5e3
The Game Of Threat Hunting
Posted May 28, 2021
Authored by Akash Sarode

This paper is focused on the various ways in which threat hunting can be performed. It is based on the author's research of semi-automating the entire process by creating a tool based on machine learning and applying analytics.

tags | paper
SHA-256 | 6af7c1449c75828f7976e682efcd001d246afb3c611194a09d283daac934ebe6
Active Directory Attacks - Red It Out
Posted Nov 9, 2020
Authored by Akash Sarode

This paper is focused on the Active directory attacks and various techniques which can be used by an attacker to abuse an AD environment in an enterprise network. This would also mark an introduction to Active directory along with its components. Topics covered include an introduction to Active Directory, Active Directory Structure, Multiple Attack Phases, Domain Persistence Techniques, Golden Ticket Attack, DCSync Attack, Silver Ticket Attack, and DSRM Attack techniques.

tags | paper
SHA-256 | 44a6dc0147aec02f155b590f92ed64b64954750c17a82f9750df4a42169a6b70
Analysis Using Analytics In Cybersecurity
Posted Aug 8, 2019
Authored by Akash Sarode

This is a brief whitepaper discussing the use of analytics when hunting for threats and notes some open source tools that can provide help.

tags | paper
SHA-256 | 18525786505ac237f2a1eb0774841f333bda5911afa3229941ffeb938eea4c77
Threat Hunting - Hunter Or Hunted
Posted Jun 21, 2019
Authored by Akash Sarode

This whitepaper details methodologies in relation to threat hunting.

tags | paper
SHA-256 | b140c0a2d5b03908ec656abeeecb9c2639808c3de67bc648b07b4db3a813d8de
Machine Learning - Learning Cybersecurity
Posted Aug 10, 2018
Authored by Akash Sarode

Whitepaper called Machine Learning - Learning Cybersecurity.

tags | paper
SHA-256 | 80ab2d27c57df335948cf2475c2f2b380fa6654de6e16605d2716820f2744441
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close