Cyber security

3 Results / Page 1 of 1

Background
Artificial Ignorance Analysis

today22nd July 2021

  • 12
close

Cyber security Arun R M

Artificial Ignorance Analysis

By request, here's a quick how-to on log scanning via artificial ignorance. :) It assumes UNIX and the presence of a good grep - you could use other stuff if you wanted to but this is just an example.. Setting up a filter is a process of constant tuning. First [...]
Let's find the ghost in windows laptop without tools!

today12th July 2021

  • 95
  • 145

Cyber security + Global news Arun R M

Let’s find the ghost in windows laptop without tools!

User Management Activity @cynorsense Run below commands in powershell with elevated privilages. "Get-WinEvent -FilterHashtable @{LogName="Security";ID=4720,4722,4724,4738,4732,1102}" Above command will help you understand user managmenet activity. System Activity @cynorsense Run below commands in powershell with elevated privilages. check Get-WinEvent -FilterHashtable @{LogName="System";ID=7030,7045,1056,7045,1000,100001,10100,20001,20003,24576,24577,24579} Detailed information on windows system: #############-THIS IS CYNORSENSE-############ # Please save [...]
Cyber Immunity Score

today18th June 2021

  • 292
Featuredstar
close

Cyber security + Global news Arun R M

Cyber immunity : You can protect only what you know! #CyberImmunity #CIScore

What is Cyber Immunity ? #CIScore Reputation Systems Online IdentityTechnology ExposedCompromised UsersCompromised ServicesLeaked Documents Cyber Immunity Score is measure of online risk posture through risky information available online (organizations/users) and exposed vulnerabilities. Data available in the public domain which might reveal interesting information about your organization / users is of [...]
Open chat
1
Hello👋

Welcome to Cynorsense

How can we help you?