Information Security is the name of the game. Don't let the hackers win!
Time to start looking into cyber security frameworks. For this episode we're looking at the the NIST Cyber Security Framework. We're also explaining what a cyber security framework is and how they can help. LINKS1. NIST Cyber Security Framework (CSF)FIND US ON1. Twitter - DamienHull2. YouTube
Time for another maintenance episode where we review our systems and management process. This time were looking at our Digital Ocean servers, Automox patch management, Fortinet Firewalls, and the password manager Bitwarden. FIND US ON1. Twitter - DamienHull2. YouTube
Almost roasted our VMware server to death. Don't do what I did. Enjoy!LINKS1. VMware Server: Super Micro SYS-E300-9D-8CN8TP2. Fans: Noctua NF-A4x20 PWMFIND US ON1. Twitter - DamienHull2. YouTube
LastPass was hacked last year. As LastPass customers we need to evaluate the impact that has on Section 9. Should we continue to use the product? Should we migrate to a different password manager? How do we evaluate a password manager? Consider this the start of a longer conversation about LastPass and password managers. FIND US ON1. Twitter - DamienHull2. YouTube
Found some really interesting and helpful videos. One walks you through an Active Directory hacking lab. Another talks about default configurations and bad passwords as a way to hack into systems. The last one is about building a home lab. These are just what I needed. LINKS1. SANS Workshop – NTLM Relaying 101: How Internal Pentesters Compromise Domains2. The Top $ num Reasons You Got Hacked in 2022 with Kent & Jordan | 1 Hour3. How to Build a Home Lab for Infosec with Ralph May | 1 HourFIND US ON1. Twitter - DamienHull2. YouTube
Found a video that walks you through the process of setting up an Active Directory Lab for hacking. I wouldn't be able to do this without a starting point. LINKS1. Mitre ATT&CK Matrix 2. How to Build an Active Directory Hacking LabFIND US ON1. Twitter - DamienHull2. YouTube
Last episode was about my crazy study plan, or lack of one. Time to put together a proper study plan. One that works. FIND US ON1. Twitter - DamienHull2. YouTube
Last episode was about my crazy study plan, or lack of one. Time to put together a proper study plan. One that works. FIND US ON1. Twitter - DamienHull2. YouTube
Time to jump into my crazy, unorganized study process. Trying to study or learn the CISSP, pentesting, risk assessments, and keep up with my current certification requirements. I've also signed up for two Antisyphon classes. Beginner Classes1. SOC Core Skills2. Getting Started In Security With BHIS and Mitre Att&ck3. Active Defense & Cyber DeceptionAdvanced Classes1. Introduction to Pentesting2. Red Team: Getting Access3. Professionally Evil CISSP Mentorship ProgramFIND US ON1. Twitter - DamienHull2. YouTube
Time to create a policy for asset inventory. This will help us define what we need in our asset inventory. It will also help us define what we need in our procedures. The process we use to manage the inventory. LINKS1. Enterprise Asset Management Policy TemplateFIND US ON1. Twitter - DamienHull2. YouTube
We're scanning our network with runZero to get an inventory of devices. What did it find? What can we learn from this inventory? How well does it work? LINKS1. runZero - Active discovery tool for asset inventoryFIND US ON1. Twitter - DamienHull2. YouTube
We're in the process of implementing the CIS controls. This will take time. We're also very busy. Are there any gaping security holes that we need to fix? Do we have any security controls in place? Can we wait to implement the CIS controls?LINKS1. runZero - Active discovery tool for asset inventory2. Enterprise Asset Management Policy TemplateFIND US ON1. Twitter - DamienHull2. YouTube
Time to get an accurate inventory of the devices on our network. Once we have an inventory, we can move on to policies and procedures. LINKS1. runZero - Active discovery tool for asset inventory2. Enterprise Asset Management Policy TemplateFIND US ON1. Twitter - DamienHull2. YouTube
Time for another maintenance episode. This time were going back to the CIS Controls. This time were using version 8. Hoping to implement the first 7. FIND US ON1. Twitter - DamienHull2. YouTube
Time to start learning Azure. We've had Azure AD and Microsoft 365 for years. Just added Azure to the mix. Lots to learn. LINKSFree Azure AccountFIND US ON1. Twitter - DamienHull2. YouTube
Time to go down the OSINT rabbit hole. What is it? What are we looking for? What are some of the tools we can use? LINKS1. Kali Linux2. Shodan2. Spiderfoot4. theHarvester5. OSINT FrameworkFIND US ON1. Twitter - DamienHull2. YouTube
Time to dig in and start learning the tools. LINKS1. Kali Linux2. Nmap3. Shodan4. Gophish5. Zap6. Burp SuiteFIND US ON1. Twitter - DamienHull2. YouTube
Got a new job. This makes our lab environment more important than ever. Some labs will be for me. Others will be for work. We need to make sure everything is working. We also need good documentation. No more messing around. FIND US ON1. Twitter - DamienHull2. YouTube
There could be a new job in my future. Before that happens, we need to organize our IT. We're looking at patching, Microsoft Defender for Business, and data recovery. FIND US ON1. Twitter - DamienHull2. YouTube
Time for some new projects. Still have a few things to do with Wazuh. Once that's done, I'll need something new to work on. Python is the big one. Seems everyone is asking for Python skills these days. LINKS1. The Azure Sandbox – Purple EditionFIND US ON1. Twitter - DamienHull2. YouTube
Wazuh! It works! Not only does it work, but it's awesome. We're also covering detection as part of a security program. You can't have good security without detection. We're also throwing in a bit of VMware management. Can't manage labs in VMware without some management know how. LINKS1. Wazuh · The Open Source Security Platform2. Lab Instructions - Emulation of ATT&CK techniques and detection with Wazuh3. Sysmon config from SwiftOnSecurity4. Wazuh Server Rules5. Video: Installing The EDR Solution WazuhFIND US ON1. Twitter - DamienHull2. YouTube
Time for more Wazuh and Sysmon. This time we're adding Atomic Red Team for testing. This is starting to look really good. Unfortunately we're missing something. LINKS1. Wazuh · The Open Source Security Platform2. Lab Instructions - Emulation of ATT&CK techniques and detection with Wazuh3. Sysmon config from SwiftOnSecurity4. Wazuh Server Rules5. Video: 163. Use Sysinternals Sysmon with Wazuh: The Swiss Army Knife for Windows MonitoringFIND US ON1. Twitter - DamienHull2. YouTube
We've packed a lot into one episode. We're reviewing Dorothy's lab, Wazuh & Sysmon and Microsoft 365. We do have some good news. Got Sysmon installed. We also have access to good Microsoft 365 instructions and a book. We're moving in the right direction. LINKS1. Sysmon Installation2. Microsoft 365 Business Premium Partner Playbook and Readiness Series3. Office 365 for IT Pros4. ITProMentor: The Microsoft 365 Consultant's BundleFIND US ON1. Twitter - DamienHull2. YouTube
There are many ways to answer this question. First, you need some skills. For this ongoing project we've decided to focus on Windows. Server 2019, Windows 10 and 11, and a bit of networking for good measure. One has to start somewhere. FIND US ON1. Twitter - DamienHull2. YouTube
We're in the process of testing Microsoft Defender for Business. This includes vulnerability management, endpoint detection and response and a lot more. This could be the security solution we've been looking for. LINKS1. Overview of Microsoft Defender for Business 2. Video: Onboarding Windows 10 devices to Defender for BusinessFIND US ON1. Twitter - DamienHull2. YouTube
Of course security solutions aren't 100% perfect. So, why are people building security programs around perfect solutions? LINKS1. YouTube Video: "Prevention First": An Approach to Cybersecurity w/ Minerva Labs!FIND US ON1. Twitter - DamienHull2. YouTube
Time to go deeper down the Sysmon rabbit hole. Looks like Wazuh does a lot more than we thought. LINKS1. Sysmon2. WazuhFIND US ON1. Twitter - DamienHull2. YouTube
Time to start thinking about our Sysmon deployment. There are a lot of moving parts to this project. It won't be a simple install on Windows 10. That's just a small part of the project. LINKS1. Security Onion2. Getting started with Elastic Stack3. Sysmon4. WazuhFIND US ON1. Twitter - DamienHull2. YouTube
We're conducting a mini security audit. We've got our short list of things we're doing for security. Are they working for us? Are there things we need to change? How are we doing?LINKS1. Security Onion2. Getting started with Elastic Stack3. Sysmon4. AppLocker FIND US ON1. Twitter - DamienHull2. YouTube
It works! We have application allow listing with AppLocker. Pushed out the settings from Intune. This is awesome!NOTE: No links to instructions for Intune and AppLocker. I need to find good documentation or write my own. LINKS1. Security Onion2. Getting started with Elastic Stack3. Sysmon4. AppLocker FIND US ON1. Twitter - DamienHull2. YouTube
We've come up with a short list of things we should do for security. These are industry recommended solutions. They make it extremely hard for an attacker to get in. LINKS1. Security Onion2. Getting started with Elastic Stack3. Sysmon4. AppLocker FIND US ON1. Twitter - DamienHull2. YouTube
Security in a lab is one thing. Security in the real world is something else. Time to start thinking of real world solutions. LINKS1. Pay What You Can Training - List of Antisyphon training that includes John Strands classes. FIND US ON1. Twitter - DamienHull2. YouTube
Do you know what devices are on your network? Do you have an accurate inventory? Discover what's really connected to your network with Rumble.run. This is an awesome network discovery tool.LINKS1. Rumble.run2. Nmap - Nice but not as cool as RumbleFIND US ON1. Twitter - DamienHull2. YouTube
Time for another round of security training. This time it's John Strands Cyber Deception class. We're also talking about job hunting Jason Blanchard style. LINKS1. Active Defense & Cyber Deception w/ John Strand - Starts 1-24-222. Jason Blanchard: Twitter Account3. Jason Blanchard: Twitch AccountFIND US ON1. Twitter - DamienHull2. YouTube
A proper explanation of our Fortinet firewall licensing. Goals, tasks, and lessons learned. LINKS1. FortiGate 60F - We have two of these.2. Overlay Controller VPN (OCVPN)FIND US ON1. Twitter - DamienHull
Time to get licenses for our Fortinet firewalls. They expire next month. We're also planning for next year. LINKS1. Free Python Class - Focused on network automation. 2. FortiGate 60F - We have two of these.FIND US ON1. Twitter - DamienHull
We're talking Python classes, Wi-Fi issues, security training and more. We're also beginning to plan for next year. Yup, the new year is right around the corner. LINKS1. Free Python Class - I'm not ready for this class. Might go back to it when I've learned the basics. FIND US ON1. Twitter - DamienHull
What's next for our lab? What should we focus on? What kinds of things can we add to it?FIND US ON1. Twitter - DamienHull
It use to take us forever to build a lab. Lots of documentation, testing and planning has changed that. Big step in the right direction. FIND US ON1. Twitter - DamienHull
We need to build a new network. One that includes a Firewall, Windows Domain Controller, Windows 10 and Windows 11 workstations. This will be our starting lab. One we can add to in the future. FIND US ON1. Twitter - DamienHull
As the title says, we're analyzing logs with Logwatch. Big step in the right direction. Started this back in episode 218. Couldn't get email to work. It works! Not only does it work, but we can catch evil. LINKS1. Logwatch2. Postfix3. How To Install and Configure Postfix on Ubuntu 20.04 4. Rsyslog TLS configuration : Ubuntu simple step-by-stepFIND US ON1. Twitter - DamienHull
Found a new tool called Netbox. This tool was designed to document large data centers. We're trying to use it to document our network. Lots of cool features and lots of moving parts to think about.LINKS1. What is NetBox - FREE Network Documentation System?2. i HATE network documentation....but NetBox might help // ft. Jeremy Cioara3. Installing Netbox in 10 Minutes or LessFIND US ON1. Twitter - DamienHull
Time to analyze our cloud server logs. For that we're going to use Logwatch. This will require the Postfix SMTP server for sending email. We also need the UFW firewall. Once again, lots of moving parts. LINKS1. Logwatch2. Postfix3. How To Install and Configure Postfix on Ubuntu 20.04 FIND US ON1. Twitter - DamienHull
We're talking Windows 11 and VMware Updates. Did an Install of Windows 11 in our VMware environment. This required a virtual TPM. Moved on to VMware updates. This included updates to ESXi and VCSA. Lots of moving parts to these projects. LINKS1. Create a Virtual Machine with a Virtual Trusted Platform Module 2. Configuring and Managing vSphere Native Key ProviderFIND US ON1. Twitter - DamienHull
We're trying to get the most out of 365. That includes learning how to use apps like Teams, Planner, OneNote and more. There's a lot of moving parts to this. Installing, configuring, training, standards and more. We're still at the beginning stages of this process. We have a long way to go. FIND US ON1. Twitter - DamienHull
Time to plan for a new Wi-Fi Access Point. We're replacing our old Asus Wi-Fi router with a Fortinet Access Point. What are the risks? How much downtime will there be? What's our backout plan?FIND US ON1. Twitter - DamienHull
Time to add another DNS server to the network. This could be considered a small project. It still has a lot of moving parts. What OS should we use? What hardware should we use? Can we manage another server? FIND US ON1. Twitter - DamienHull
Dorothy want's to speed up the installation of Windows Server 2019 in the lab. We're looking into an automated install. We're also looking at all the steps leading up to the install. How do we connect to our VMware server? How do we create a VM? How do we make everything faster?FIND US ON1. Twitter - DamienHull
Yes we can! We're using Intune, Azure AD and Automox to manage two laptops. The same process we use for two could be applied to 1,000. Settings, applications and updates can all be pushed out with a few mouse clicks. FIND US ON1. Twitter - DamienHull
I've had 3 job interviews this year. Here's what I've learned so far. FIND US ON1. Twitter - DamienHull
We're focusing on basic Microsoft 365 security. We're also reviewing our Microsoft 365 Business Premium Licensing. LINKS1. m365maps.com 2. Basic Security Set Up for Microsoft 365FIND US ON1. Twitter - DamienHull