Blue Team peeps. I've got a favor to ask. Do you have any screenshots of adversary activity you could share with me? Redacted where necessary, of course. I'm trying to help a friend out with a presentation they're giving. The person who was supposed to help her is in the hospital
-
-
Windows perspective is ideal as most of her students are operating in that environment
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte višeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Some can be simulated. Without monitoring, maybe first screenshots: Slower network? Report your hosts are spamming, blacklisted? High CPU load as hosts are mining crypto currency? Then review monitoring software option and manufacture events to simulate scans, and attacks?
-
I don't have the screenshots desired. Manufacturing a range of levels of "detection" up to real examples with full session logging, and host logging could be informative and entertaining.
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.