Published inSystem Weakness·PinnedDetect FIN6 on Azure Sentinel Part 2: Threat Hunting using KQLHi Medium! Here we are again with a new article about Sentinel this is the follow-up (part 2) to the previous article Detect FIN6 on Sentinel Part 1: Run FIN6 exploit. This article To give a summary of the previous article, we created our lab environment and simulated the FIN6…Sentinel11 min readSentinel11 min read
PinnedDetect FIN6 on Sentinel Part 1: Run FIN6 exploitHi Medium! Here we are again with a new article about Sentinel. In this article, we will learn how we can detect FIN6 attack on Sentinel, this exercise is one of the most important ways to learn how to detect APT and high threats on your SIEM, this time our…Exploitation4 min readExploitation4 min read
Sep 29Simulate Discovery Techniques on Windows via Atomic RedHi Medium! Here we are again with a new article related to Sentinel, we will simulate different attacks and we will show you how we can detect them in the next articles that will come. Src: https://github.com/redcanaryco/atomic-red-team This article We will show how we can test our SOC and the capabilities to…Cybersecurity5 min readCybersecurity5 min read
Jan 3Incident response and automation using VirusTotal Intel on SentinelHi Medium! Here we are again with a new article about Sentinel. In this article, we will take how we can introduce VirusTotal to Sentinel and how we use it for incident response. Contents Create a playbook or automation on Azure Configure the automation process to VT Add the playbook to our alert Resources…Security4 min readSecurity4 min read
Sep 30, 2022How to Create Alerts on Sentinel from Threat Intelligence FeedsHi Medium! Here we are again with a new article about Sentinel. This article will introduce how to create alerts based on threat intelligence feeds, and what workbook to use, we will go through the following: Create Threat Intelligence Alert Add an Indicator Manually Threat Intelligence Workbook Before we start you can check the previous article regarding importing threat intelligence feeds…Threat Intelligence5 min readThreat Intelligence5 min read
Published inSystem Weakness·Jan 20, 2022Threat Intelligence on Sentinel (Anomali & IBM X-Force)Hi Medium! Here we are again with a new article about Sentinel. In this article, we will introduce how to link threat intelligence platform feeds to our Azure Sentinel. Contents Definition of TAXII and STIX. 2 STIX. 2 TAXII 2 How to add Anomali TI feeds to Sentinel How to add IBM X-Force Feeds to Sentinel Definition of TAXII and STIX STIX STIX, short for Structured Threat Information eXpression, is a standardized language developed by MITRE and the OASIS Cyber Threat Intelligence (CTI)…Threat Intelligence6 min readThreat Intelligence6 min read
Published inSystem Weakness·Jan 18, 2022Detect and Alert on SentinelHi Medium! Here we are again with a new article about Sentinel. In this article, we will go give a simple introduction on how to create an alert on Sentinel. Contents Detect Brute Forcing Attack using KQL Define brute force Understanding KQL code Alert Brute Forcing Attack on RDP Simulate the RDP attack Resources Detect Brute Forcing Attack using KQL To create an alert, we need to first know what we want to detect and how to detect it so…Sentinel4 min readSentinel4 min read
Jan 8, 2022Sysmon and log Parse using KQL on Azure Sentinel[6 min] Read Hi Medium! Here we are again with a new article. In this article, we will go through different tools and techniques that should be known to retrieve information from a target system and review its log on the Sentinel Azure platform. Summary Windows 10 VM creation and Sysmon…Sentinel6 min readSentinel6 min read
Jan 15, 2021How to detect a cyber threatsHow to detect a cyber attack or a threat Hi Medium! Here we are again with a new article, today we will talk about advanced threat detection and the several methods used in defense as follows: Threat Detection Concept How We Can Detect Threats 1. Threat Detection Team Facing different attacks is not an easy job, the threat detection team need to act…Cybersecurity3 min readCybersecurity3 min read
Jan 8, 2021SMTP Enumeration TechniqueHi Medium! Here we are again with a new article, I was asked by a friend in my last article about Enumeration to provide a breakout on the SMTP technique. In this article, we will go through different tools and techniques that should be known to retrieve information about your…Smtp3 min readSmtp3 min read