h1
Powershell - Collecting information
h1
John the Ripper - Pentools
h1
DFIR - Windows Event ID
h1
Palo Alto Basics - Traffic Monitor Filtering
h1
Wireshark notes - DFIR
h2
Basics of Traffic Monitor Filtering
h2
Collecting information using powershell
h3
Cracking Hashes from /etc/shadow
h3
Cracking Windows Hashes
h3
Cracking a Password Protected Zip File
h3
Cracking a Password Protected RAR Archive
h3
Cracking SSH Key Passwords
h3
Internet Layer Traffic
h3
Host Traffic Filter Examples
h3
Zone Traffic Filter Examples:
h3
Port Traffic Filter Examples:
h3
Date/Time Traffic Filter Examples:
h3
Interface Traffic Filter Examples:
h3
Allowed/Denied Traffic Filter Examples
h3
Combining Traffic Filter Examples
h3
Application layer traffic
h3
Detecting Network Attacks with Wireshark
h3
Detection of network port scanning
h3
Detection of network attacks
h4
Basic Filtering Syntax
h4
IPv4 Protocol Filtering
h4
Filter subnets and IP ranges in Wireshark
h4
Using Single Crack Mode
h4
EVENT LOG RELATED TO ACCOUNT LOGON/LOGOFF
h4
EVENT LOG RELATED TO SCHEDULED TASKS
h4
EVENT LOG RELATED TO NETWORK SHARE ACCESS
h4
EVENT LOG RELATED TO SERVICES
h4
KERBEROS FAILURE CODES
h4
To install hash identifier in kali linux
h4
Format-Specific Cracking
h4
Get information about the make and model of a computer
h4
Get information about the BIOS of the current computer
h4
List installed hotfixes (QFEs, or Windows Update files)
h4
Get the username of the person currently logged on to a computer
h4
Find just the names of installed applications on the current computer
h4
Get IP addresses assigned to the current computer
h4
Get a more detailed IP configuration report for the current machine
h4
To find network cards with DHCP enabled on the current computer
h4
Enable DHCP on all network adapters on the current computer
h4
Navigate the Windows Registry like the file system
h4
Find the five processes using the most memory