Skip to content

Latest commit

 

History

History
1215 lines (585 loc) · 33 KB

index.md

File metadata and controls

1215 lines (585 loc) · 33 KB

Cyber Security Resources File

Please feel free to fork this repository and add resources.

Other lists

Awesome Awesomeness

A curated list of amazingly awesome awesomeness.

Application Security (AppSec)

How Hackers Steal Web Session Cookies From Facebook in Chrome?

https://gbhackers.com/how-hackers-steal-web-session-cookies-from-facebook-in-chrome/

Bugcrowd run a free online conference called LevelUp which is focused on bug bounties

https://www.bugcrowd.com/resources/levelup/

Katie Paxton-Fear

https://www.youtube.com/user/RapidBug

https://www.youtube.com/watch?v=qqmyAxfGV9c

Portswigger Web Security Academy is really good for learning different bug classes

https://portswigger.net/web-security

The DEFCON AppSec village has a few videos on their channel

https://www.appsecvillage.com/

Web App Hacking With Tib3rius | The Hacker Factory With Phillip Wylie

https://itspmagazine.simplecast.com/episodes/web-app-hacking-with-tib3rius-the-hacker-factory-with-phillip-wylie-ESL0dG16

Blue Team

Easy Playbooks to Make Ransomware Criminals Cry

https://www.helminfosec.com/post/easy-playbooks-to-make-ransomware-criminals-cry

Capture the Flag (CTF)

ACSC cyber security challenge

https://www.cyber.gov.au/acsc/view-all-content/news/acsc-cyber-security-challenge

CTF Events

https://ctftime.org/event/list/

PwnTillDawn Online Battlefield

https://online.pwntilldawn.com/

BlueTeam CTF Challenges

https://cyberdefenders.org/labs/

People streaming their CTF hacking live

https://www.linkedin.com/posts/joshuacmason_cjshrekt-twitch-activity-6803838984083542016-ia4T

Capture the Flag? Change Your Life

https://www.youtube.com/watch?v=9WhQUItNNMw

Offensive Security Proving Grounds (PG)

https://www.offensive-security.com/labs/

Cyber KnockOut at RSACTM 2021

https://play.katzcy.com/cyber_knockout_rsac

Downloadable CTF virtual machines (install them into VirtualBox on your own machine)

https://www.vulnhub.com/

Hacker101 has a great CTF with the advantage that you can earn private invites

https://www.hacker101.com/

Hack the box

https://www.hackthebox.eu/

Try Hack Me

https://tryhackme.com/

RangeForce

https://www.rangeforce.com/

Setup Practice Ctf's from Vulnhub on Kali Linux

https://null-byte.wonderhowto.com/how-to/setup-practice-ctfs-from-vulnhub-kali-linux-0170228/

US Cyber Games

https://www.uscybergames.com/

MemLabs

https://github.com/stuxnet999/MemLabs

MemLabs is an educational, introductory set of CTF-styled challenges which is aimed to encourage students, security researchers and also CTF players to get started with the field of Memory Forensics.

Capture the Flag (CTF) walkthroughs and write ups

PwnTillDawn JuniorDev (10.150.150.38)

https://more4money.medium.com/juniordev-10-150-150-38-f54de60de13c

Cheat Sheets

Cheatsheet-God

https://github.com/OlivierLaflamme/Cheatsheet-God

Wireshark Cheat Sheet

https://www.comparitech.com/net-admin/wireshark-cheat-sheet/

Kali Linux Commands List : Hackers Cheat Sheet

https://www.ethicalhackx.com/kali-linux-commands-list/

Hacking Cheatsheet : List of commands and techniques for penetration testing

https://github.com/kobs0N/Hacking-Cheatsheet

Cloud Security

Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time

https://www.datacenterknowledge.com/security/report-cloud-security-breaches-surpass-prem-ones-first-time

SANS book: Practical Guide to Security in the AWS Cloud

https://pages.awscloud.com/Book-SEC-mult-SANS-Practical-Guide-Security-AWS-Cloud.html

Cyber Hygiene

How effective is basic account hygiene at preventing hijacking

https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html

Cybersecurity Magazine

Cybersecurity Quarterly

https://issuu.com/cybersecurityquarterly

Cybersecurity Organisations

CISA Bad Practices

https://www.cisa.gov/BadPractices

May 24, 2021 Australian Cyber Security Growth Network (AustCyber) Secure By Design: Cyber Resilience for Industry (South Australia, Australia)

https://www.youtube.com/watch?v=cLuE5sDhA9s

Association for computing Machinary

https://www.acm.org/

AustCyber

https://www.austcyber.com/

CyberSeek

https://www.cyberseek.com.au/

IEEE

https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&partnerref=mktgemail_0217&eventid=2969917&sessionid=1&key=F6B6E6E708C20AC018C10CE516E49D83&regTag=1230562&V2=false&sourcepage=register

https://spectrum.ieee.org/webinars

IoT Security Institute (IoTSI)

https://iotsecurityinstitute.com/iotsec/index.php

Women in the IT Channel

https://www.iotssa.com/women-in-the-it-channel/

Defense

PrintNightmare python scanner

https://github.com/byt3bl33d3r/ItWasAllADream

How secure is your RMM, and what can you do to better secure it?

https://www.gavsto.com/how-secure-is-your-rmm-and-what-can-you-do-to-better-secure-it/

Zoom CIS Compliance Scans

https://github.com/turbot/steampipe-mod-zoom-compliance

How to Audit Privileged Access in Active Directory?

https://www.linkedin.com/pulse/how-audit-privileged-access-active-directory-sanjay-tandon/

Blue Team Labs Online - A gamified platform for defenders to practice their skills in security investigations and challenges covering; Incident Response, Digital Forensics, Security Operations, Reverse Engineering, and Threat Hunting.

https://blueteamlabs.online/

YARA Rules Guide: Learning this Malware Research Tool

https://www.varonis.com/blog/yara-rules/

Who’s most likely to hack your systems?

https://archerint.com/whos-most-likely-to-hack-your-systems/

How to Install and Set-up Sysmon for Windows Endpoint Devices

Sysmon is a component of the Microsoft Sysinternals Suite that runs as a kernel driver and may monitor and report on system events. Businesses frequently utilize it as part of their tracking and logging systems.

Applocker

AaronLocker

https://github.com/microsoft/AaronLocker

Honeypots

Awesome Honeypots

https://github.com/paralax/awesome-honeypots

The Art of the Honeypot Account: Making the Unusual Look Normal

https://www.hub.trimarcsecurity.com/post/the-art-of-the-honeypot-account-making-the-unusual-look-normal

Detecting Kerberoasting Activity Part 2 – Creating a Kerberoast Service Account Honeypot

https://adsecurity.org/?p=3513

Incident Response

CISA Protect your Network: Strengthen your cybersecurity with our Incident Response Training

https://www.youtube.com/playlist?list=PL-BF3N9rHBLJaSbTRPyWYj56f0m2uDQD7

Discord Channels

Black Hills Information Security Discord community

https://discord.com/invite/bhis

Hacking Articles

https://lnkd.in/dC5TT8q

Cyber Insecurity (Neal Bridges)

https://discord.gg/GQWU5G9

Demonstrations and POC

Penetration Testing

15 Ways to Bypass the PowerShell Execution Policy

https://www.netspi.com/blog/technical/network-penetration-testing/15-ways-to-bypass-the-powershell-execution-policy/

Browser In The Browser (BITB) Attack

This article explores a phishing technique that simulates a browser window within the browser to spoof a legitimate domain.

Attacking Active Directory: 0 to 0.9

https://zer1t0.gitlab.io/posts/attacking_ad/

Live Attack Simulation

https://www.cybereason.com/live-attack-simulation-02-04-21

SQL Injection Demo

https://www.linkedin.com/posts/davidbombal_sql-injection-activity-6793926606864818176-8zpm

Ultimate Password Cracking Techniques Used by Hackers

https://thycotic.com/company/blog/event/webinar-how-your-company-passwords-get-hacked/

Employment and Job Hunting

LinkedIn and career finding

https://www.cyberhuntingguide.net/career-finding.html

Breaking into Cybersecurity cheatsheet

https://www.linkedin.com/pulse/breaking-cybersecurity-cheatsheet-jay-jay-davey/?trackingId=JQif2kzfIKXpuWufVPDgrQ%3D%3D

Cyber Security Interview Questions [Real]

https://www.ethicalhackx.com/cyber-security-interview-questions/

A Conversation With Mayor-Turned-Hacker, Joe Helle | The Hacker Factory With Phillip Wylie

https://itspmagazinepodcast.com/episodes/a-conversation-with-mayor-turned-hacker-joe-helle-the-hacker-factory-with-phillip-wylie-7RvokgaT

ASD jobs:

https://www.linkedin.com/posts/paulwoodsau_ever-considered-working-for-australias-oldest-activity-6782172361790771200-hFV8

Breaking into Cybersecurity cheatsheet

https://www.linkedin.com/posts/noxcyber_cyberjobs-cyberstudy-jobhunt-ugcPost-6765913599803179008-i_sf

Digital Guardians At The Gate: Job Hunting In 2021

https://www.audacy.com/podcasts/itspmagazine-podcast-45828/digital-guardians-at-the-gate-job-hunting-in-2021-with-christina-stokes-your-everyday-cyber-with-limor-kessem-and-diana-kelley-374617082

Recruiter recommendations for junior level cyber security applicants:

https://www.linkedin.com/posts/paulwoodsau_there-are-not-enough-entry-level-security-activity-6775212677720539136-iySZ

Seek

https://www.seek.com.au/

Veterans employment

https://www.withyouwithme.com/

What is the Applicant Tracking System (ATS)?

https://blogs.chapman.edu/career/2021/02/12/what-is-the-applicant-tracking-system-ats/

GCR - Governance, Risk, and Compliance

Managing Governance, Risk, and Compliance for a Resilient Organization

Get togethers and Meet Ups

SecTalk Sydney

https://www.linkedin.com/posts/chadsaliby_security-sydney-cyber-activity-6769919241660563456-F7m1

Github

GitHub Guide

https://guides.github.com/activities/hello-world/

Hacking Software and Services

Detailed write up from CISCO TALOS regarding Dark Utilities C2 service: Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns

Hacking API

Free API Hacking course!

Securing and Testing Your APIs - The Workshop

Home lab for Cybersecurity

Hacking Articles Pentest Lab Setup

https://www.hackingarticles.in/category/pentest-lab-setup/

Active Directory Pentesting: Lab Setup

https://www.hackingarticles.in/active-directory-pentesting-lab-setup/

Penetration Testing Lab Setup:Cloud Computing

https://www.hackingarticles.in/penetration-testing-lab-setupcloud-computing/

Cybersecurity home lab

https://www.linkedin.com/posts/davidbombal_do-you-need-a-cybersecurity-home-lab-activity-6790313531674775553--QEY

IOT and Cybersecurity

Home routers are being hijacked using vulnerability disclosed just 2 days ago

https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/08/home-routers-are-being-hijacked-using-vulnerability-disclosed-just-2-days-ago/

Actively exploited bug bypasses authentication on millions of routers

https://www.databreaches.net/actively-exploited-bug-bypasses-authentication-on-millions-of-routers/

Hackers Exploiting New Auth Bypass Bug Affecting Millions of Arcadyan Routers

https://thehackernews.com/2021/08/hackers-exploiting-new-auth-bypass-bug.html

StealthWorker botnet targets Synology NAS devices to drop ransomware

https://seclists.org/dataloss/2021/q3/126

Voluntary Code of Practice Securing the Internet of Things for Consumers

https://www.homeaffairs.gov.au/reports-and-publications/submissions-and-discussion-papers/code-of-practice#

Living off the Land Attacks

A Wolf in Sheep's Clothing: Dissecting Living off the Land Techniques

https://www.sans.org/webcasts/wolf-sheeps-clothing-dissecting-living-land-techniques-114615

Malware

A Complete Malware Analysis Tutorials, Cheatsheet & Tools list for Security Professionals

https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/

Malware collection

https://github.com/Red-Laboratory/Malware-collection

vx-underground

https://github.com/vxunderground

Unprotect Project

Malware authors spend a great deal of time and effort to develop complex code to perform malicious actions against a target system. It is crucial for malware to remain undetected and avoid sandbox analysis, antiviruses or malware analysts. With this kind of technics, malware are able to pass under the radar and stay undetected on a system. The goal of this free database is to centralize the information about malware evasion techniques.

Hijack Libs

For defenders, this project can provide valuable information when trying to detect DLL Hijacking attempts. Although detecting DLL Hijacking isn't always without challenge, it is certainly possible to monitor for behaviour that may be indicative of abuse. To further support defenders, out-of-the-box Sigma rules are provided through this website. A σSigma feed containing detection rules for all entries part of this project is available too.

For red teamers, this project can help identify DLLs that can be used to achieve DLL Hijacking. The aim of this project is not to make it easy to abuse the recorded vulnerabilities; as such, PoCs, code templates or tuturials are not provided.

OSINT

THE DARK WEB - Using the Dark Web for OSINT Investigations

https://events.skopenow.com/q2-2021-dark-web-webinar

How To Perform External Black-box Penetration Testing in Organization with “ZERO” Information

https://gbhackers.com/external-black-box-penetration-testing/

Active Directory Exploitation Cheat Sheet

https://ethicalhackersacademy.com/blogs/ethical-hackers-academy/active-directory

Active Countermeasures Webcasts

https://www.activecountermeasures.com/webcasts/

Wild West Hackin Fest (pay what you can) training from Balck Hills Security

https://wildwesthackinfest.com/training-schedule/

FragAttacks (fragmentation and aggregation attacks)

https://www.fragattacks.com/

The impact of attacks can also be reduced by manually configuring your DNS server so that it cannot be poisoned. Specific to your Wi-Fi configuration, you can mitigate attacks (but not fully prevent them) by disabling fragmentation, disabling pairwise rekeys, and disabling dynamic fragmentation in Wi-Fi 6 (802.11ax) devices. Note, live testing OS available.

Open Source Intelligence (OSINT) Tools & Resources

The Ultimate OSINT Collection by hatless1der

Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT!

Online Summits and Conferences

Cyber Security Global Summit'21 (July 27 to 29, 2021)

https://cs.geekle.us

Critical Vulnerabilities in Network Devices: Past, Present & Future (July 17, 2021)

https://www.linkedin.com/events/6813402945061748738/

CISO Critical Infrastructure Online A/NZ (July 13, 2021)

https://www.linkedin.com/events/6795888806701731840/

Administering AWS Infrastructure || Free Technical Workshop (July 9, 2021)

https://www.linkedin.com/events/6813395109871157248/

Australian Healthcare Week 2021

https://ahwathome.ap1.pathable.com/

OptivCon Virtual

https://gateway.on24.com/wcc/experience/optiv/1237620/3161384/

AWS Summit Online for Australia & New Zealand

https://aws.amazon.com/events/summits/online/anz/

Cyber World Congress: Virtual Cyber Security Event

Free registration (voucher on this page): https://www.linkedin.com/events/6742073406709137408/

Dell Technologies’ multi-day summit Building Cybersecurity Pathways for All Students:

https://lnkd.in/eE5APFf

Microsoft Cloud Training Events

https://www.microsoft.com/en-au/cloud-training-events/

Mitre Attack conference

https://attack.mitre.org/resources/attackcon/

New to Cyber Summit 2021 - Live Online

https://www.sans.org/event/newtocyber-summit-2021

OWASP Lightning Events - How to turn your Cybersecurity Hobby into a Career - An Introduction to Bugbounties - March 15, 2021:

https://lightning.owasp.org/

Security Skills Bootcamp

https://www.microsoft.com/en-au/cloud-training-events/security-cloud-skills-in-a-week

Think2021 IBM conference

https://ibm.app.swapcard.com/event/think21

The Modern SOC Summit sumo logic

https://modernsoc21.sumologicevents.com/

Virtual Cybersecurity Summit ANZ

https://events.ismg.io/event/virtual-cybersecurity-summit-anz-2021/

Online Penetration Testing Tools

Cryptii - Modular conversion, encoding and encryption online

https://cryptii.com/

CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.

https://gchq.github.io/CyberChef/

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.

https://gtfobins.github.io/

WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.

https://wadcoms.github.io/

Other inperson or non-free conferences

Australian Cyber Conference 2021

https://cyberconference.com.au/canberra/

BSides Canberra 2021

https://bsidescbr.com.au/

Penetration Testing (PenTesting)

Active Directory Enumeration: BloodHound

https://www.hackingarticles.in/active-directory-enumeration-bloodhound/

Windows Privilege Escalation: SeImpersonatePrivilege

https://www.hackingarticles.in/windows-privilege-escalation-seimpersonateprivilege/

Kali Linux networking

https://miloserdov.org/?p=542

HackTricks - amazing online resource detailing hundreds of penetration testing technics

https://book.hacktricks.xyz/

Cobalt Strike

https://www.cobaltstrike.com/

How to Identify Cobalt Strike on Your Network

https://www.darkreading.com/threat-intelligence/how-to-identify-cobalt-strike-on-your-network/a/d-id/1339357

This is how the Cobalt Strike penetration testing tool is being abused by cybercriminals

https://www.zdnet.com/article/this-is-how-the-cobalt-strike-penetration-testing-tool-is-being-abused-by-cybercriminals/

Privileged Access - The Proverbial Keys to the Kingdom

https://www.paramountdefenses.com/insights/privileged-access

List of 100 Most Vulnerable Apps, Systems & Platforms to Practice Penetration Testing -2021

https://ethicalhackersacademy.com/blogs/ethical-hackers-academy/practice-penetration-testing

How to bypass Defender in a few easy steps

https://arty-hlr.com/blog/2021/05/06/how-to-bypass-defender/

10 Best Free Web Application Penetration Testing Tools 2021

https://cybersecuritynews.com/web-application-pentesting-tools/

How to Write Penetration Testing Report

https://www.linkedin.com/posts/cybersecurity-news_how-to-write-penetration-testing-report-activity-6795040717963194370-4kGO

Burp Suite for Pentester

https://github.com/Ignitetechnologies/BurpSuite-For-Pentester

Malware Campaign Utilizes Microsoft Executable MSBuild

https://www.avertium.com/malware-campaign-utilizes-microsoft-msbuild/

Penetration Testing Tools Reference Guide

https://www.engetsu-consulting.com/2021/02/05/penetration-testing-tools-reference-guide/

The Pentester Blueprint

https://www.linkedin.com/posts/the-pwn-school-project_the-pwn-school-project-is-hosting-the-pentester-activity-6789931573505609728-qHOX

Upgrade your Hacking Tools

https://robertscocca.medium.com/upgrade-your-common-hacking-tools-45ba700d42bb

Want to Hack? Learn The Cyber Kill Chain

https://www.youtube.com/watch?v=oCUrkc_0tmw

Why Good SOC Analysts Know Offense & Defense

https://www.youtube.com/watch?v=nit5LBiYcNo

Red Team Phishing Campaign Open-Source Framework (GOPHISH)

https://getgophish.com/

Penetration Testing Tools (Online)

Atomic Red Team

https://atomicredteam.io/

https://github.com/redcanaryco/atomic-red-team

Atomic Red Team: Hands-on Getting Started Guide (Black Hills Security)

https://register.gotowebinar.com/register/2656603025618084366?source=BHISLI

Red Team Resources (Software/Hardware/Physical)

I'll Let Myself In: Tactics of Physical Pen Testers

https://youtu.be/rnmcRTnTNC8

Python

Python Socket server

https://pythonprogramming.net/python-binding-listening-sockets/

Ransomware

Ransomware Readiness Assessment CSET v10.3

https://github.com/cisagov/cset/releases/tag/v10.3.0.0

CISA Ransomware Outbreak

https://www.cisa.gov/publication/ransomware-outbreak

Raccine - A Simple Ransomware Protection

https://github.com/Neo23x0/Raccine

Ransomware: Survive by outrunning the guy next to you

https://www.zdnet.com/article/ransomware-survive-by-outrunning-the-guy-next-to-you/

Reddit (sub-reddits)

Computer Security - IT security news, articles and tools

https://www.reddit.com/r/ComputerSecurity/

r/cyber: The 5th Domain of Warfare

https://www.reddit.com/r/cyber/

cyberlaws: Legal News Related ToTechnology And The Net

https://www.reddit.com/r/cyberlaws/

cybersecurity

https://www.reddit.com/r/cybersecurity/

Cybersecurity and Privacy for Beginners

https://www.reddit.com/r/Cybersecurity101/

Cyber Security Jobs

https://www.reddit.com/r/CyberSecurityJobs/

Data Recovery

https://www.reddit.com/r/datarecovery/

Hacking and cracking, done respectfully

https://www.reddit.com/r/ethicalhacking/

Exploit Development

https://www.reddit.com/r/ExploitDev/

r/fulldisclosure - Vulnerability Disclosure and Network Security Topics

https://www.reddit.com/r/fulldisclosure/

Hack Bloc

https://www.reddit.com/r/HackBloc/

Hackers

https://www.reddit.com/r/hackers/

HackerSec

https://www.reddit.com/r/hackersec/

hacking: security in practice

https://www.reddit.com/r/hacking/

A forum for the security professionals and white hat hackers.

https://www.reddit.com/r/Hacking_Tutorials/

Your Hacking Tutorial by Zempirians

https://www.reddit.com/r/HowToHack/

Information Security

https://www.reddit.com/r/Information_Security/

Information Security News

https://www.reddit.com/r/InfoSecNews/

Malware Analysis & Reports

https://www.reddit.com/r/Malware/

Managed Service Providers

https://www.reddit.com/r/msp/

/r/netsec - Information Security News & Discussion

https://www.reddit.com/r/netsec/

Network Security: News and Information

https://www.reddit.com/r/NetworkSecurity/

pwned

https://www.reddit.com/r/pwned/

Red Team Security

https://www.reddit.com/r/redteamsec/

SecurityCTF : CTF announcements & writeups

https://www.reddit.com/r/securityCTF/

Web Security - developing and maintaining secure websites

https://www.reddit.com/r/websecurity/

Reports

Red Canary’s 2021 Threat Detection Report

https://redcanary.com/threat-detection-report/

2020 Cost of a Data Breach Report

https://www.ibm.com/security/data-breach

Security Awareness

Reduce the risk of human error with security awareness training done right

https://www.mimecast.com/products/awareness-training/

Cybersecurity: Don't blame employees—make them feel like part of the solution

https://www.techrepublic.com/article/cybersecurity-dont-blame-employees-make-them-feel-like-part-of-the-solution/

Gamification is the future of cybersecurity training | Cyber Work Podcast

https://www.infosecinstitute.com/podcast/gamification-making-cybersecurity-training-fun/

https://www.youtube.com/watch?v=F4fZkBe5FUo

Security Resources

Become a Microsoft Security Ninja Resources

https://www.linkedin.com/pulse/become-microsoft-security-ninja-resources-katie-anderson/

Security Standards and Frameworks

Introduction to OWASP Top 10 2021

https://owasp.org/Top10/

Secure Controls Framework (SCF)

https://www.securecontrolsframework.com/

ACSC ReportCyber (AU) Cyber crime reporting Australia

https://www.cyber.gov.au/acsc/report

CIS Benchmarks Demo

https://www.cisecurity.org/webinar/cis-benchmarks-demo/

Consumer Data Right (CDR) legislation - Australia

https://www.oaic.gov.au/consumer-data-right/cdr-legislation/

Notifiable Data Breach Scheme - Austaalia

https://www.oaic.gov.au/privacy/notifiable-data-breaches/

Data Breach Notification Laws – An Ultimate Guide for Businesses - Australia

https://www.webberinsurance.com.au/data-breach-notification-laws-ultimate-guide

Reported data breaches in Australia (NDB) - Australia

https://www.webberinsurance.com.au/data-breaches-list

Podcast OzCyber Unlocked Industry-led cyber security standards – why are they important?

https://austcyber.buzzsprout.com/1228793/7508962-industry-led-cyber-security-standards-why-are-they-important

CIS Benchmarks March 2021 Update

https://www.cisecurity.org/blog/cis-benchmarks-march-2021-update/

CORIE framework launched to test cyber resilience of Australia's financial services industry

https://www.cfr.gov.au/news/2020/mr-20-06.html

MITRE Attack

https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html

https://attack.mitre.org/

https://www.youtube.com/watch?v=oCUrkc_0tmw

(ENISA) Risk and threat assessment - Threat Landscape Mind Map (PDF)

https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-thematic-landscapes/threat-landscape-of-the-internet-infrastructure/threat-mind-map/at_download/file

SQL Injection Attacks

SQL Injection Demo

https://www.linkedin.com/posts/davidbombal_sql-injection-activity-6793926606864818176-8zpm

SOC

Greylog - free and open source log proccessing and reporting

https://www.graylog.org/

LetsDefend Memory Analysis challenge

https://www.linkedin.com/posts/an-fam-868921105_cybersecurity-thankyou-share-activity-6802675805072695296-dmQn

Letsdefend - demonstration

https://www.linkedin.com/posts/stefan-wa_letsdefend-lab-review-activity-6801238044851658752-hfZb

Diving Deeper to Understand the Windows Event logs for Cyber Security Operation Center (SOC)

https://gbhackers.com/event-logs-cyber-security-operations-center/

Sitdown with a SOC Star: 11 Questions With Haylee Mills of Charles Schwab

https://securityboulevard.com/2020/12/sitdown-with-a-soc-star-11-questions-with-haylee-mills-of-charles-schwab/

Say Goodbye to Your Big Alert Pipeline, and Say Hello to Your New Risk-Based Approach” at the Splunk .conf conference in 2018

https://conf.splunk.com/files/2018/recordings/say-goodbye-to-your-sec1479.mp4

Supply Chain Attacks

Threat Explainer: Supply Chain Attacks

https://blogs.cisco.com/security/threat-explainer-supply-chain-attacks

Training and Courses

Free and Virtual

Microsoft

Learn new skills and discover the power of Microsoft products with step-by-step guidance. Start your journey today by exploring our learning paths and modules.

Cyber@ANZ - 5 to 6 hour free cyber security course (with completion certificate)

https://www.theforage.com/virtual-internships/prototype/Hf4QMESoFeQwXPsiH/Cyber-Security-Virtual-Program

AWS Summit Online for Australia & New Zealand

https://aws.amazon.com/events/summits/online/anz/

Fortinet NSE 1 and 2 coures

https://training.fortinet.com/local/staticpage/view.php?page=certifications

Splunk Boss of Ops + O11y - May 14 - click on show all events

https://splunk.swoogo.com/2021gps/boo?linkId=115140433

Splunk Education Resources (Fundamentals 1, webinairs, etc)

https://education.splunk.com/free

Splunk Fundamentals 1

https://www.splunk.com/en_us/training/free-courses/splunk-fundamentals-1.html

Microsoft Ignite Skills: Complete/Learn a New Skill & Earn Microsoft Cert. Exam

https://slickdeals.net/f/14873734-microsoft-ignite-skills-complete-learn-a-new-skill-earn-microsoft-cert-exam-free-complete-by-march-30-2021

Not free and virtual

TCM Security - The Super Bundle (look for a discount code on Heaths twitter account)

https://academy.tcm-sec.com/p/the-super-bundle

Threat Hunting

Open Threat Hunting Framework

What to hunt for and how to hunt for it - using the Open Threat Hunting Framework IRL

Make Your Incident Response and Threat Hunting Easier With Powershell Hunting Tools

Kansa is a framework for incident response using PowerShell. This framework can be used within an enterprise to collect data for incident response, breach hunts, and environment baseline creation.

Vulnerabilities

KrebsOnSecurity Hit By Huge New IoT Botnet “Meris” (MikroTik routers)

https://krebsonsecurity.com/2021/09/krebsonsecurity-hit-by-huge-new-iot-botnet-meris/

Netgear Authentication Bypass Allows Router Takeover

https://threatpost.com/netgear-authentication-bypass-router-takeover/167469/

CISA Offers New Mitigation for PrintNightmare Bug

https://threatpost.com/cisa-mitigation-printnightmare-bug/167515/

CISA-FBI Guidance for MSPs and their Customers Affected by the Kaseya VSA Supply-Chain Ransomware Attack

https://us-cert.cisa.gov/ncas/current-activity/2021/07/04/cisa-fbi-guidance-msps-and-their-customers-affected-kaseya-vsa

Kaseya Supply-Chain Attack Hits Nearly 40 Service Providers With REvil Ransomware

https://thehackernews.com/2021/07/kaseya-revil-ransomware-attack.html

Vigilance - public vulnerability remdiation

https://vigilance.fr/?langue=2

SANS Internet Storm Center

https://isc.sans.edu/

Microsoft Patch Tuesday by Morphus Labs

https://patchtuesdaydashboard.com/

uncover

uncover is a go wrapper using APIs of well known search engines to quickly discover exposed hosts on the internet. It is built with automation in mind, so you can query it and utilize the results with your current pipeline tools.

Vulnerability Testing

Joe Sandbox

https://www.joesandbox.com/analysispaged/0

cb_looper - extract and parse cobalt strike C2 configs

https://gitlab.com/interdiction_/cb_looper

Confluence CVE-2021-26084 vulnerability

https://github.com/search?q=CVE-2021-26084

Nuclei - vulnerability scanner

https://github.com/projectdiscovery/nuclei

Bad patching practices are a breeding ground for zero-day exploits, Google warns

https://www.cyberscoop.com/project-zero-google-zero-days-patching/

End-of-Support Software Report List

https://www.cisecurity.org/blog/end-of-support-software-report-list-2/

Plex Media servers are being abused for DDoS attacks

https://www.zdnet.com/article/plex-media-servers-are-being-abused-for-ddos-attacks/

Websites and Blogs

AttackIQ

https://attackiq.com/

GB hackers on Security

https://gbhackers.com/

Windows Sysinternals **

System Monitor (Sysmon) is a Windows system service and device driver

https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon

Sysmon 14.0 — FileBlockExecutable

https://medium.com/@olafhartong/sysmon-14-0-fileblockexecutable-13d7ba3dff3e

Youtube Accounts to Follow

13Cubed

BlackPerl

Bugcrowd

David Bombal

Gerald Auger - Simply Cyber

Hak5

HackerSploit

Infosec Institute

InfoSec Live

IppSec

John Hammond

LiveOverflow

Loi Liang Yang

Neal Bridges

NetworkChuck

Null Byte

OWASP

Peter Yaworski

Seytonic

Webpages and miscellaneous resources

Secure home working on personal IT (NCSC UK)

https://www.ncsc.gov.uk/blog-post/secure-home-working-personal-it

The Big Threat to Security Teams by Chloé Messdaghi

https://www.youtube.com/watch?v=oC9Zp8xzThA

Microsoft warns: Watch out for this new malware that steals passwords, webcam and browser data

https://www.zdnet.com/article/microsoft-warns-watch-out-for-this-new-malware-that-steals-passwords-webcam-and-browser-data/

How To Hack A Hospital

https://www.youtube.com/watch?v=iNrfnnGGeJs

Let's Automate: LINUX PRIVILEGE ESCALATION - Part 1

https://www.youtube.com/watch?v=gc2cFwT_Fd0

Windows Defender vs Ransomware in 2021

https://www.youtube.com/watch?v=ZbYx8V2RTjc

Leaky John Deere API’s: Serious Food Supply Chain Vulnerabilities Discovered by Sick Codes, Kevin Kenney & Willie Cade.

https://sick.codes/leaky-john-deere-apis-serious-food-supply-chain-vulnerabilities-discovered-by-sick-codes-kevin-kenney-willie-cade/

At the HEART of the SolarWinds Breach - Privileged Access in Active Directory

https://blog.paramountdefenses.com/2021/05/at-the-heart-of-the-solarwinds-breach.html

Detecting cyber threats and preventing

https://docs.google.com/document/d/1_DaciFToZjitG4tLCqOKKQPJvRAZ_gpobjHuoj_sjaY/

New tools to block legacy authentication in your organization

https://techcommunity.microsoft.com/t5/azure-active-directory-identity/new-tools-to-block-legacy-authentication-in-your-organization/ba-p/1225302

ITSP Magazine RSA Broadcast Alley

https://path.rsaconference.com/flow/rsac/us21/itsp/page/itsp

Pipeline Ransomware Attack: What We Know and How to Prepare

https://pages.checkpoint.com/amer-security-best-practices-for-ot-may-2021.html

Notetaking Software - Keep track of course material and building cheatsheets/blogs/writeups.

http://keepnote.org/

Screenshot capture/image-editing software

https://getgreenshot.org/

(Programming) - (RegExr) Regular Expression Interactive Builder, Tester and Learning Resource

https://regexr.com/