Cyber Security

Sunday, August 13, 2017

Forensics: Imaging a Drive

›
Background   This blog post will cover how to image a hard drive(s) of a workstation/desktop computer. The process for imaging a large ...
1 comment:
Wednesday, June 7, 2017

OSINT: Nmap

›
Disclaimer Do NOT preform network scans on networks without prior authorization. Download Nmap for Windows Nmap for Linux Background...
2 comments:
Monday, March 20, 2017

Cyber Security Analyst (Part 3 of 3)

›
Writing Snort Signatures This series will cover analyzing the common data types found in cyber security incidents; Netflow,  Domain(s) ...
30 comments:
Friday, March 10, 2017

Social Engineering Toolkit: Credential Harvesting

›
Overview The Social Engineering Toolkit (SET) is specifically designed to perform advanced attacks against the human element.[1] Requir...
8 comments:

OSINT Tool: Recon-ng

›
How to Use Open Source Intelligence Tool RECON-NG Overview "Recon-ng is a full-featured Web Reconnaissance framework written in ...
Wednesday, March 1, 2017

Cyber Security Analyst (Part 2 of 3)

›
PCAP Data Analysis This series will cover analyzing the common data types found in cyber security incidents; Netflow,  Domain(s) & IP...
3 comments:
Sunday, January 22, 2017

Cyber Security Analyst (Part 1 of 3)

›
Netflow Data Analysis This series will cover analyzing the common data types found in cyber security incidents; Netflow,  Domain(s) & ...
‹
›
Home
View web version

About Me

My photo
bdavis
I have 7+ years of experience in the field of cyber security performing the functions of OSINT, Network Monitoring, Policy & Procedure writings, and Infrastructure architecture.
View my complete profile
Powered by Blogger.