الأحد، 1 أغسطس 2021

SOC Process



 SOC Process

هو الـ Standard الى هنشتغل عليه فى الـ SOC على سبيل المثال لو فى Incident حصل مينفعش كل حد فى الـ SOC يشتغل بطريقة لازم يكون فى Standard معين الـ SOC شغال بى الـ Process دى فى بعض الاحيان بيبقى أسمها PlayBook 


بعض منصات وأدوات الـ Threat Intelligence




 بعض منصات وأدوات الـ Threat Intelligence




AlienVault OTX

IBM X-Force Exchange

Palo Alto Networks AutoFocus

LogRhythm Threat Lifecycle Management (TLM) Platform

Maltego

Shodan

الأربعاء، 28 يوليو 2021

Hacking Type

 


Hacking Type

  • White Hat Hackers
  • Black Hat Hackers
  • Gray Hat Hackers
  • Script Kiddies
  • Green Hat Hackers
  • Blue Hat Hackers
  • Red Hat Hackers
  • State/Nation Sponsored Hackers
  • Hacktivist
  • Malicious insider or Whistleblower

Phases of Hacking

 


Phases of Hacking

1. Reconnaissance

2. Scanning

3. Gaining Access

4. Maintaining Access

5. Clearing Track

Vulnerability Assessment Phases




Vulnerability Assessment Phases:

1. Vulnerability identification (testing)

2. Vulnerability analysis

3. Risk assessment

4. Remediation

Vulnerability Assessment Type

 


Vulnerability Assessment Type:

Active Assessments

Passive Assessments

External Assessments

Internal Assessments

Host-based Assessments

Network Assessments

Application Assessments

Wireless Network Assessments