6 Followers
4 Following
15 Posts

Free Azure Labs:

1. Create a new user in Azure AD
https://lnkd.in/gm2Qfr5A

2. Manage Azure AD identities
https://lnkd.in/gGKN-7eX

3. Enable SSPR in Azure AD
https://lnkd.in/ggKKt5NZ

4. Create a conditional access policy
https://lnkd.in/gZigbcdQ

5. Explore Microsoft security score
https://lnkd.in/gxaarvqK

6. Use secure score in Microsoft Defender to improve security posture
https://lnkd.in/gFKnSFX5

7. Microsoft 365 Defender for Cloud Apps
https://lnkd.in/gJjFwmpa

8. Explore the Service Trust Portal
https://lnkd.in/g-ReCYKw

9. Explore the Microsoft Purview compliance portal
https://lnkd.in/gP_-RSck

10. Explore compliance manager
https://lnkd.in/gUd6BYaK

11. Manage subscriptions and RBAC
https://lnkd.in/g4Jmzu9q

12. Manage governance via Azure Policy
https://lnkd.in/gSF6vJPt

13. Manage Azure resources by using the Azure Portal
https://lnkd.in/gFAzwgPd

14. Manage Azure resources by using ARM templates
https://lnkd.in/g-Xf7Crj

15. Manage Azure resources by using Azure PowerShell
https://lnkd.in/gPyDt2zW

16. Manage Azure resources by using Azure CLI
https://lnkd.in/gqXTn9fN

17. Implement virtual networking
https://lnkd.in/gRb8cbei

18. Implement inter-site connectivity
https://lnkd.in/gU9Zt7Dc

19. Implement traffic management
https://lnkd.in/geThBtbA

20. Manage Azure storage
https://lnkd.in/gdYd7u-4

21. Manage virtual machines
https://lnkd.in/gisq2g2e

22. Implement Azure web apps
https://lnkd.in/gFs7vJQy

23. Implement Azure Container Instances
https://lnkd.in/ghvPHPx9

24. Implement Azure Kubernetes Service
https://lnkd.in/gXMa847F

25. Backup virtual machines
https://lnkd.in/gJTVUnw8

26. Implement monitoring
https://lnkd.in/gcd3hytY

#Free #Azure #Cloud #Labs

[๐…๐‘๐„๐„ ๐‘๐„๐’๐Ž๐”๐‘๐‚๐„๐’ - ๐๐ซ๐ข๐ฏ๐ข๐ฅ๐ž๐ ๐ž ๐ž๐ฌ๐œ๐š๐ฅ๐š๐ญ๐ข๐จ๐ง ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ ๐š๐ง๐ ๐‹๐ข๐ง๐ฎ๐ฑ]

During pentest engagements you will have to escalate privileges.
Want to know more about this and sharpen your skills?
This post is for you!

๐Ÿ‘‰ ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ ๐—˜๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป?
๐ŸŒŸ Cybersecurity 101 - What is Privilege escalation on CrowdStrike https://lnkd.in/e4diwQrf
๐ŸŒŸ Privilege Escalation Attack and defend explained on BeyondTrust
https://lnkd.in/enQ-AMhB

๐Ÿ‘‰ ๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„๐˜€ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ ๐—˜๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป
๐ŸŒŸ My Pentips on Windows Privilege escalation on CSbyGB - Pentips
https://lnkd.in/eXgR_Eua
๐ŸŒŸ Windows Privilege Escalation on PayloadsAllTheThings
https://lnkd.in/e7rGg5MF
๐ŸŒŸ Windows Privesc guide on absolombโ€™s security blog
https://lnkd.in/eBfktNes
๐ŸŒŸ Privilege Escalation Windows on sushant747โ€™s gitbook
https://lnkd.in/egU96ktp
๐ŸŒŸ Windows Local Privilege Escalation checklist on HackTricks
https://lnkd.in/eJqFJy8n

๐Ÿ‘‰ ๐—Ÿ๐—ถ๐—ป๐˜‚๐˜… ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ ๐—˜๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป
๐ŸŒŸ My Pentips on Linux Privilege Escalation on CSbyGB - Pentips
https://lnkd.in/ekx-xdfm
๐ŸŒŸ Linux Privilege Escalation on PayloadsAllTheThings
https://lnkd.in/ePmZSw6t
๐ŸŒŸ Basic Linux Privilege Escalation on g0tm1lkโ€™s blog
https://lnkd.in/e7dCUQXM
๐ŸŒŸ Guide Linux Privilege Escalation on Payatu
https://lnkd.in/eMD3JRbE
๐ŸŒŸ Linux Privilege Escalation on shushant747โ€™s gitbook
https://lnkd.in/eh-gV2km
๐ŸŒŸ A curated list of Unix Binaries to bypass local security restrictions by GTFOBins
https://lnkd.in/eucjKtCP
๐ŸŒŸ Linux Privilege Escalation Checklist on HackTricks
https://lnkd.in/ef_wgGex

#cybersecurity #security #pentest #privilege

What is Privilege Escalation? - CrowdStrike

A privilege escalation attack is a cyberattack designed to gain unauthorized privileged access into a system.

crowdstrike.com

81 of the Best Security Resources in 2022

- 11 Free Security Training Resources (https://lnkd.in/gpHV2mTw)

- Free GRC Platform (www.phalanxgrc.com)

- 10 Risk Assessment Frameworks and Guides (https://lnkd.in/gHty4FwQ)

- 8 Essential ISO 27001 Templates and Guides (https://lnkd.in/gBeQtHYu)

- 7 Business Skill for Security Professionals (https://lnkd.in/gKMTj-Vw)

- 11 Best Security YouTube Channels (https://lnkd.in/gHx_fsvw)

- 5 Great Security Podcasts (https://lnkd.in/ggTTtGeN)

- 10 Vulnerability Management Resources (https://lnkd.in/gC-pAqDn)

- 10 Great PCI DSS Resources (https://lnkd.in/gtZW3muT)

- 8 Essential SOC 2 Resources (https://lnkd.in/gtaUqHKK)

Add your favorite security resources in the comments so we can save this as a resource for later! ๐Ÿ‘‡

#security #compliance #cybersecurity

Christian Hyatt on LinkedIn: #cybersecurity #informationsecurity #securityawareness | 136 comments

Links to Free Cybersecurity Training (Add anything I'm missing in the comments. I want to save this post as a reference for later!) ๐Ÿญ. ๐—–๐˜‚๐—ฟ๐—ฟ๐—ถ๐—ฐ๐˜‚๐—น๐—ฎโ€ฆ | 136 comments on LinkedIn

Stealing passwords from infosec Mastodon - without bypassing CSP

The story of how I could steal credentials on Infosec Mastodon with a HTML injection vulnerability, without needing to bypass CSP. Everybody on our Twitter feed seemed to be jumping ship to the infose

PortSwigger Research

Harvard University is offering free online courses.

No application or fee required.

Here are 5 FREE courses you don't want to miss:

1. Introduction to Computer Science

An introduction to the intellectual enterprises of computer science and the art of programming.

https://lnkd.in/gSNmNtAJ

2. Web Programming with Python and JavaScript

This course takes you deeply into the design and implementation of web apps with Python, JavaScript, and SQL using frameworks like Django, React, and Bootstrap.

https://lnkd.in/gQ5ZyHV9

3. Introduction to Programming with Scratch

A gentle introduction to programming that prepares you for subsequent courses in coding.

https://lnkd.in/gvxNc-gq

4. Introduction to Programming with Python

An introduction to programming using Python, a popular language for general-purpose programming, data science, web programming, and more.

https://lnkd.in/gQTv8gJJ

5. Understanding Technology

This is CS50โ€™s introduction to technology for students who donโ€™t (yet!) consider themselves computer persons.

https://lnkd.in/gTrjWR8a

#free #cybersecurity #cyber #python #programming #javascript #computer

CS50: Introduction to Computer Science | Harvard University

An introduction to the intellectual enterprises of computer science and the art of programming.

Harvard University

The Google Cloud team has built a collection of #YARA signatures to detect older versions of #CobaltStrike that are commonly cracked and used by malicious threat actors.
#ThreatHunting #DFIR #threatdetection

https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse

Making Cobalt Strike harder for threat actors to abuse | Google Cloud Blog

A new initiative from Google Cloud and Cobalt Strikeโ€™s vendor has made it easier to find and block cracked versions of the popular red team software.

Google Cloud Blog