Cheat Sheets

How to Perform a Compromise Assessment with Velociraptor: Your Guide to Cybersecurity
Compromise Assessment
Joseph McCray

Performing a Compromise Assessment with Velociraptor: Your Cybersecurity Lifeline

Contents1 How to Perform a Compromise Assessment with Velociraptor: Your Guide to Cybersecurity2 What’s a Compromise Assessment Anyway?3 Why Choose Velociraptor?4 Step-by-Step Guide to Conducting a Compromise Assessment5 Keep Your Cybersecurity Strong6 Conclusion7 CTA How to Perform a Compromise Assessment with Velociraptor: Your Guide to Cybersecurity In today’s fast-paced cyber

Read More »
Performing a compromise assessment with Wazuh
Compromise Assessment
Joseph McCray

Performing a compromise assessment with Wazuh

Contents1 How to Perform a Compromise Assessment Using Wazuh2 Understanding Compromise Assessments3 Setting Up Wazuh3.1 Installation Steps3.2 2. Install the Wazuh Agent:3.3 3.Configure the Wazuh Manager:3.4 4. Start Wazuh Services:3.5 Sample Configuration4 Conducting the Compromise Assessment4.1 Step 1: Monitoring Log Files5 Performing a Compromise Assessment with Wazuh6 Understanding Compromise Assessments7

Read More »
Compromise Assessment
Joseph McCray

Performing a Compromise Assessment with ELK: An In-Depth Guide

Contents1 Performing a Compromise Assessment with ELK2 Understanding Compromise Assessments3 Why Choose the ELK Stack?4 Steps to Perform a Compromise Assessment with ELK4.1 Step 1: Define Objectives and Scope4.2 Step 2: Set Up the ELK Stack4.3 Step 3: Ingest Data Using Logstash4.4 Step 4: Analyze Data in Elasticsearch4.5 Step 5:

Read More »
Compromise Assessment
Joseph McCray

Performing a Compromise Assessment with Osquery: The Ultimate Guide

Contents1 Performing a Compromise Assessment with Osquery2 1. Introduction to Compromise Assessments3 2. What is Osquery?4 3. Why Use Osquery for Compromise Assessments?5 4. Step-by-Step Guide to Conducting a Compromise Assessment with Osquery5.1 a) Initial Setup5.2 b) Baseline Query Execution5.3 c) Suspicious Activity Detection5.4 d) Analyzing Network Connections5.5 e) Log

Read More »