Red Teaming with Caldera (Attack and Detect)
This article demonstrates a framework for conducting red team activity using open-source breach & emulation. In addition to MITRE simulation, it also […]
Read MoreCopyright 2023 by EventLogs!!
This article demonstrates a framework for conducting red team activity using open-source breach & emulation. In addition to MITRE simulation, it also […]
Read MoreIn this blog, we will discuss how bloodhound can be detected using just the Windows system logs (Sysmon). What is Bloodhound? Today, […]
Read MoreNTLM hashing is a technique used to authenticate a user’s password to a Windows service. This method uses the hash of the […]
Read MoreA bug bounty program is a great way to get valuable feedback and even earn some money. It’s a perfect opportunity to […]
Read More