Open in app
Home
Notifications
Lists
Stories

Write
M'hirsi Hamza
M'hirsi Hamza

Home
About

Published in System Weakness

·Pinned

Detect and Alert on Sentinel

Hi Medium! Here we are again with a new article about Sentinel. In this article, we will go give a simple introduction on how to create an alert on Sentinel. Contents Detect Brute Forcing Attack using KQL Define brute force Understanding KQL code Alert Brute Forcing Attack on RDP Simulate the RDP attack Resources Detect Brute Forcing Attack using KQL To create an alert, we need to first know what we want to detect and how to detect it so…

Sentinel

4 min read

Detect and Alert on Sentinel
Detect and Alert on Sentinel

Published in System Weakness

·Jan 20

Threat Intelligence on Sentinel (Anomali & IBM X-Force)

Hi Medium! Here we are again with a new article about Sentinel. In this article, we will introduce how to link threat intelligence platform feeds to our Azure Sentinel. Contents Definition of TAXII and STIX. 2 STIX. 2 TAXII 2 How to add Anomali TI feeds to Sentinel How to add IBM X-Force Feeds to Sentinel Definition of TAXII and STIX STIX STIX, short for Structured Threat Information eXpression, is a standardized language developed by MITRE and the OASIS Cyber Threat Intelligence (CTI)…

Threat Intelligence

6 min read

Threat Intelligence on Sentinel (Anomali & IBM X-Force)
Threat Intelligence on Sentinel (Anomali & IBM X-Force)

Jan 8

Sysmon and log Parse using KQL on Azure Sentinel

[6 min] Read Hi Medium! Here we are again with a new article. In this article, we will go through different tools and techniques that should be known to retrieve information from a target system and review its log on the Sentinel Azure platform. Summary Windows 10 VM creation and Sysmon…

Sentinel

6 min read

Sysmon and log Parse using KQL on Azure Sentinel
Sysmon and log Parse using KQL on Azure Sentinel

Jan 15, 2021

How to detect a cyber threats

How to detect a cyber attack or a threat Hi Medium! Here we are again with a new article, today we will talk about advanced threat detection and the several methods used in defense as follows: Threat Detection Concept How We Can Detect Threats 1. Threat Detection Team Facing different attacks is not an easy job, the threat detection team need to act…

Cybersecurity

3 min read

How to detect a cyber attack or a threat
How to detect a cyber attack or a threat

Jan 8, 2021

SMTP Enumeration Technique

Hi Medium! Here we are again with a new article, I was asked by a friend in my last article about Enumeration to provide a breakout on the SMTP technique. In this article, we will go through different tools and techniques that should be known to retrieve information about your…

Smtp

3 min read

SMTP Enumeration Technique
SMTP Enumeration Technique

Dec 15, 2020

How proxy works and different types of proxy

Proxy types and how it works Hello Medium!! I always missed understanding the way proxies are used, however, the definition is so simple but people still miss understand how they are used and each time they made me unsure of the knowledge I have. So once and for all we will go together through all the…

Proxy

8 min read

Proxy Types and What is a Proxy?
Proxy Types and What is a Proxy?

Dec 8, 2020

How to implement OSSIM (SIEM Solution)

Hi Medium! Here we are again with a new article, today we will share a small tutorial where we will implement the OSSIM solution, so we will talk about : Introduction 2.1 Work environment 2.1.1 Hardware environment 2.1.2 Software environment 2.2 Implementation and test Conclusion Introduction In this chapter, we…

Siem

4 min read

How to implement OSSIM (SIEM Solution)
How to implement OSSIM (SIEM Solution)

Nov 23, 2020

SOC Technology and Best Practice

SOC technology and Best Practice Hi Medium! Here we are again with a new article, today we will talk about SOC technology and Best Practice. We are going to discover : + What is SOC? + Why is SOC Important? + SOC Management + Best Practice + Conclusion 1- What is SOC? SOC (Security Operation Center), is a division…

Soc

5 min read

SOC Technology and Best Practice
SOC Technology and Best Practice

Nov 20, 2020

TLS Overview

TLS Overview Hi Medium! Here we are again with a new article, today we will talk about TLS Overview as follow: 1. Confidentiality 2. Integrity 3. Availability 4. Defence in Depth 5. Symmetric encryption 6. Asymmetric encryption 7. Cryptographic Hash function 8. Man In The Middle (MITM) 9. Transport Layer Security 10. Banking Malware That Uses TLS…

Tls

6 min read

TLS Overview
TLS Overview

Nov 18, 2020

Enumeration

Enumeration Hi Medium! This is the Enumeration part. In this chapter we are going to discover the following topics: Introduction Why Enumeration? Enumeration techniques Enumeration Tools on Linux and Windows Summary Introduction The most important phase before attacking a target is “Reconnaissance”.The more effort the attacker put in during this phase the…

Enumeration

6 min read

Enumeration
Enumeration
M'hirsi Hamza

M'hirsi Hamza

Cyber Security Architect

Following
  • Anton Chuvakin

    Anton Chuvakin

  • Alessandro Butler

    Alessandro Butler

  • Lou Kerner

    Lou Kerner

  • Juan Short

    Juan Short

  • Alexis Rodriguez

    Alexis Rodriguez

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable