PowerShell has gained considerable attention over the past few years in response to increased task automation in the Windows environment. PowerShell has gained considerable attention over the past few years in response to increased task automation in the Windows environment. Regardless of PowerShell’s capability to address administrators’ day-to-day operations, it is widely used for penetration testing and even attacking purposes. Specifically designed post-exploitation attacks and payloads by utilizing PowerShell are difficult to prevent on the condition thatas the attackers gain privilege accounts. All protections ranging from the control on Execution Policy, Constrained PowerShell to customize the remote endpoints, AppLocker to…

SANS institute introduced intrusion discovery cheat sheet for system administrators. The cheat sheet suggests often used commands to find any clue of system compromise. I will cover those commands here and I hope it can help you while following the cheat sheet. Unusual processes and services 1. List all processes and spot for unfamiliar one or the one that owns…

It is currently said that we are in the World of “Internet of Things” and it is difficult to refuse this truth. Your business as well, no matter what kind of business you run, you need computer system and internet to facilitate it. If you accept that it is one of your company’s core values, so how can you be…

Presently we cannot help turning away from the world of internet since almost every life concerned activity is connected someway and somehow to it. Many appliances and devices are also developed to be network-connected too. According to World Economic Forum Cybersecurity becomes a globally concerned issue. Any risks could create an impact to your business. While you may consider the…

Each business has its own different security concerns. But every business should concern of confidentiality, integrity and availability of data system. Financial sector’s top concerns are confidentiality and integrity of their data. Energy sector, on the other hand, may mainly concern availability of its services. Some sectors such as healthcare may concern all aspects of confidentiality, integrity and availability. No…