asteroza + audit   59

4964(S) Special groups have been assigned to a new logon. (Windows 10) | Microsoft Docs
Throwing important AD users into a special security audit group will raise security events in the event log to allow easier tracking. Useful for exploring an environment where people have hard coded certain accounts or registered a task/service with an inappropriate account
windows  AD  active  directory  special  user  login  audit  security  group  event  log  hacking  pentesting  defense  WEFFLES 
november 2018 by asteroza
Network Detective Overview
Apparently not bad at exploring the dark corners of an environment?
sysadmin  tools  utilities  software  networking  security  audit  compliance  discovery  inspection 
july 2018 by asteroza
Script Get-USBHistory
powershell script, useful for grabbing USB history from all PC's in a domain, useful for creating a baseline/history of USB use.
windows  USB  history  log  PowerShell  script  sysadmin  tips  tricks  logging  baseline  security  audit  auditing 
may 2018 by asteroza
With a focus on managing trade secrets and supply chain
japan  information  security  compliance  audit  outsourcing  consulting 
april 2018 by asteroza
Use a demo to see how ASR can help protect your devices | Microsoft Docs
The custom demo tool lets you create sample malware infection scenarios so you can see how ASR would block and prevent attacks
windows  sercurity  attack  surface  reduction  test  testing  prevention  defense  audit  antiexploit 
december 2017 by asteroza
LogSentinel (alpha) - Blockchain-inspired secure audit trail service
sorta like a timestamping service, but who is doing the blockchain really?
blockchain  log  audit  trail  service  hash  security 
july 2017 by asteroza
Security Analysis of TrueCryptpdfauthor - Truecrypt.pdf
Fraunhofer did an audit on Truecrypt also, didn't find anything obviously bad...
truecrypt  audit  Fraunhofer  report  encryption  security  Delicious 
november 2015 by asteroza
These guys caught the OPM hack during a product demo, similar to how a NetScreen demo exposed the RSA hack...
network  forensics  incident  response  DFIR  security  audit  auditing  software  Delicious 
june 2015 by asteroza
Power Pwn (Pre-order) | Pwnie Express
Appears to use a SheevaPlug for internals. Evil little beastie for pentesting, but I kinda doubt you can get some employee to pick one up in a parking lot and plug it into the corporate network, especially since it has a suspicious form factor/weight for a found object. But, send it in a nice box t someone, and they will probably plug it right in...
SheevaPlug  ettercap  dsniff  hydra  nmap  SSLstrip  aircrack  kismet  metasploit  debian  120V  802.11N  802  802.11g  802.11b  802.11  bluetooth  ethernet  wifi  GSM  3G  wireless  access  remote  devices  electronics  hardware  intrusion  hacking  audit  strip  security  power  pentest  testing  penetration  PwnieExpress  PowerPwn  Delicious 
july 2012 by asteroza
Damballa APT Audit Trial
Looks like they'll give you a free trial of their botnet detector.
Damballa  botnet  monitoring  detection  audit  IPS  DLP  network  security  APT  georgiatech  Delicious 
november 2011 by asteroza
Unix Root Access Control - Linux Sudo Access - Unix Privilege Management | PowerBroker Servers
Once invoked this records EVERYTHING root does, every keystroke. Which means if anyone manages to look at the logs they'll see passwords too. If you are cool with that (only look if something bad happened stance), this may not be a bad thing for a system accountability and logging solution. Beats manual change control entry...
Powerbroker  linux  sysadmin  administration  least  priviledge  account  keystroke  logging  monitoring  security  trust  accountability  server  audit  auditing  software  Delicious 
january 2011 by asteroza
Mobile Monitor
A secondary monitor for laptops, oriented for accountants/auditors (hence the number pad). Fail for requiring a separate AC power supply, but considering the use profile, not wholly unrealistic.
secondary  portable  mobile  display  DIsplayLink  USB  monitor  HID  numberpad  accountant  accounting  finance  audit  auditing  Delicious 
december 2010 by asteroza

related tags

1.1.1  1.3  3G  120V  802.11  802.11b  802.11g  802.11N  academic  access  account  accountability  accountant  accounting  active  AD  administration  agent  aircrack  aircrack-ng  airodump-ng  alternative  analysis  analyzer  antiexploit  application  APT  ARGUS  assessment  asset  assurance  attack  audit  auditd  auditing  AWS  backtrack  baseline  best  block  blockchain  bluetooth  botnet  business  C  C++  campaign  carbon  CEO  certification  change  cheating  check  client  clipboard  cloud  CMDB  CMDBuild  CO2  code  coding  command  comparison  complaince  compliance  computer  configuration  configure  console  consulting  container  control  controls  crack  cracking  cryptography  Damballa  database  debian  defense  delete  Delicious  desktop  detection  development  devices  devops  DFIR  diff  directory  discovery  display  DIsplayLink  DLP  documentation  domain  DSinternals  dsniff  electronics  elemental  email  emissions  encrypted  encryption  endpoint  enterprise  environment  ESP  ethernet  ettercap  evaluation  event  exploit  explorer  file  finance  flag  forensic  forensics  framework  fraud  Fraunhofer  frontend  fuzzer  gaming  georgiatech  GFI  git  github  go  governance  GPO  group  GSM  GUI  hack  hacking  hardware  hash  heatmap  HID  history  host  HTTP  HTTPS  hydra  IAM  ID  IDS  incident  information  infosec  inspection  intensity  international  intrusion  inventory  IPS  IRS  ISAE3402  ISO  isolation  IT  ITIL  japan  JSON  kali  key  keystroke  kismet  languard  least  LibreSSL  linux  list  liveCD  log  logging  login  logon  mac  management  map  mapping  math  metasploit  method  metrics  mitre  mobile  mode  monitor  monitoring  netflow  network  networking  nevironment  nmap  npm  number  numberpad  OpenAudIT  opengl  opensource  OpenSSL  OSX  outsourcing  OVAL  package  parameter  password  patch  penetration  pentest  pentesting  phishing  pipeline  platform  policy  portable  posture  power  Powerbroker  PowerPwn  powershell  practice  prevention  principle  print  priviledge  process  profiling  programming  protocol  protocols  PwnieExpress  python  quality  reduction  reference  registry  remote  report  response  review  risk  SAS70  scanner  scanning  script  scripts  secondary  security  sercurity  server  service  SheevaPlug  signal  SIP  Skype  SMB  SMBv1  software  source  special  SSA  SSAE16  SSH  SSL  SSLstrip  standard  standards  standars  statistical  statistics  status  strength  strip  surface  sustainability  sysadmin  syscall  system  tax  template  test  testing  theory  tips  TLS  tools  tracing  tracking  traffic  trail  transmission  tricks  truecrypt  trust  USB  user  utilities  VDI  virtualization  visualisation  visualization  VM  VoIP  vulnerability  wardriving  web  webdev  WEFFLES  WEP  wifi  windows  wireless 

Copy this bookmark: