Defcon 28 Safe Mode - Mystery Box

 

Este año el Defcon ya llegó a su fin y ahora esperar que el siguiente año pueda llevarse de forma normal, ya que, sin lugar a dudas una de las cosas que hicieron falta es la interacción persona a persona con los grandes colegas y amigos que comparten el gusto y pasión por estos eventos, que sin lugar a dudas aportan mucho para temas de Ciberseguridad. 

Por otro lado, una de las cosas a las que contribuyó es la facilidad de poder observar varios temas en poco tiempo y poder hacerlo también en horario posterior si nos perdimos alguna charla. Cosa que en otra situación, pues ya la daríamos por perdida. 

Lo anterior, permitió que pudiera hacer un compendio bastante amplio de recursos presentados en esta edición y que pueden ser de interés general, los cuales se ven a continuación.  He decidido nombrarlo como "Mystery Box" ya que prácticamente pueden encontrar de todos los temas en los siguientes enlaces, y que de verdad no me di unos minutos para ordenarlos, pero estoy seguro que encontrarán algo que pueda ser de utilidad. 

Si dentro de todas las conferencias observadas y recursos que aparecen a continuación consideran que pudiera faltar alguno, por favor escríbanlo en la sección de comentarios y compártanlo con el resto de la comunidad. 

Acá los links, espero les sean de utilidad: 

https://media.blueteamvillage.org/Workshops/

websploit.org

Proxmox

https://github.com/The-Art-of-Hacking/h4cker

https://bootcamp.h4cker.org/

https://malware-traffic-analysis.net/

https://github.com/idaholab/Malcolm

https://paralus.co/online/workshop/

https://pastebin.com/t9UMB549

https://heimdalsecurity.com/blog/how-to-get-on-the-dark-web/

https://www.tracelabs.org/trace-labs-osint-vm/

https://github.com/spacial/csirt

https://github.com/projectdiscovery/subfinder/releases/

https://zeltser.com/remnux-v7-release/

https://github.com/DefensiveOrigins/PlumHound

https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE

https://github.com/1N3/Sn1per

https://github.com/Cyb3rWard0g/HELK

https://cybercademy.org/project-ideas/

https://paralus.co/online/workshop/

https://github.com/jzadeh/aktaion2/blob/master/defcon2020/TrainingAbstract.md

https://medium.com/threat-hunters-forge/sharpen-your-simulation-game-part-1-introduction-85d785cda32c

https://leakix.net/

https://github.com/Security-Onion-Solutions/security-onion

OpenSOC Discord: https://discord.gg/bk8AhqP 

Zeek Log Docs: https://docs.zeek.org/en/stable/script-reference/log-files.html 

Deploy Zeek on your local *nix host: https://docs.zeek.org/en/stable/install/ 

Zeek Demo Environment: https://try.zeek.org/ 

Zeek Package Manager: https://packages.zeek.org/ 

Security Onion: https://securityonion.net/ 

Corelight “coffee-proof” cheatsheet: http://www3.corelight.com/coffee-proof-bro-logs

https://dfirmadness.com/building-a-siem-at-home/

https://logz.io/learn/complete-guide-elk-stack/

https://github.com/HASecuritySolutions/elastic_stack

https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-modules.html

https://grokconstructor.appspot.com/do/match

https://www.graylog.org/downloads#open-source

https://discord.gg/eCsXcFg

https://kb.objectrocket.com/elasticsearch/how-to-install-and-setup-winlogbeat-in-elasticsearch

https://uncoder.io/

https://github.com/olafhartong/sysmon-cheatsheet

https://github.com/elastic/detection-rules

https://github.com/hunters-forge/OSSEM/tree/master/detection_data_model/tables

https://posts.specterops.io/offensive-lateral-movement-1744ae62b14f

https://github.com/WillOram/windows-credential-exposure

https://github.com/nsacyber/Event-Forwarding-Guidance/tree/master/Events

https://infosecjupyterbook.com/community-workshops/defcon_btv_2020/intro.html

https://github.com/OTRF/mordor-labs

https://gchq.github.io/CyberChef/

https://bootcamp.h4cker.org/

https://github.com/clong/DetectionLab

https://dtag-dev-sec.github.io/mediator/feature/2015/03/17/concept.html

https://www.splunk.com/en_us/resources/personalized-dev-test-licenses.html

https://github.com/The-Art-of-Hacking/h4cker/tree/master/osint

https://websploit.org/

https://github.com/DefensiveOrigins/AtomicPurpleTeam

https://github.com/DefensiveOrigins/

https://github.com/DefensiveOrigins/APT-Lab-Terraform

https://cloudsecwiki.com/vulnerable_apps.html

http://flaws2.cloud/

https://github.com/Manticore-Platform/manticore-cli

https://github.com/maldevel/intelspy

https://github.com/BishopFox/sliver

https://github.com/DeimosC2/DeimosC2

https://thehiddenwiki.pw/blog/2018/07/23/client-side-attack-metasploit/

https://www.neowin.net/news/universal-usb-installer-1991/

https://systemoverlord.com/2020/07/14/raspberry-pi-as-a-penetration-testing-implant.html

https://github.com/next-security-lab/tools-generation-detection-synthetic-content

https://tryhackme.com/room/owasptop10 

https://github.com/pry0cc/axiom

https://github.com/allyomalley/dnsobserver

https://parrotsec.org/

https://bloodhoundgang.herokuapp.com/

https://mitre-attack.github.io/attack-navigator/enterprise/ https://attack.mitre.org/groups/G0073/ https://www.thec2matrix.com/ https://howto.thec2matrix.com/slingshot-c2-matrix-edition https://howto.thec2matrix.com/c2/empire#red-team-village-mayhem-demo-of-apt19 https://vectr.io/ https://www.scythe.io/

https://redteam.guide/docs/

https://dmcxblue.gitbook.io/red-team-notes/

https://0xdf.gitlab.io/2020/05/12/ngrok-ftw.html

https://github.com/yeyintminthuhtut/Awesome-Red-Teaming

https://github.com/secfigo/Awesome-Fuzzing

https://opencryptosoc.com/

https://github.com/maldevel/intelspy

https://evilcorp.biz/training.html

https://www.openplcproject.com/

https://blog.rothe.uk/excel-for-infosec/

https://github.com/projectdiscovery/subfinder/releases/

https://grafana.com/grafana/

https://github.com/StamusNetworks/SELKS

https://github.com/CERT-Polska/drakvuf-sandbox

https://github.com/DefensiveOrigins/PlumHound/issues/new/choose

https://github.com/kittymagician/Aegis

https://pentestit.com/adversary-emulation-tools-list/

https://github.com/enaqx/awesome-pentest#malware-analysis-books

https://enterprise.verizon.com/resources/reports/dbir/2020/summary-of-findings/

https://digitalguardian.com/blog/whats-cost-data-breach-2019

https://github.com/coolacid/docker-misp

https://www.betaalvereniging.nl/wp-content/uploads/TaHiTI-Threat-Hunting-Methodology-whitepaper.pdf

https://www.youtube.com/watch?v=URRaq_9mvyU

https://github.com/iti/ics-security-tools

https://www.youtube.com/watch?v=jKFzT0p7ycM

https://www.social-engineer.com/ https://twitter.com/SocEngineerInc https://twitter.com/InnocentOrg https://www.innocentlivesfoundation.org/

https://github.com/endgameinc/youarespecial

https://github.com/ShiftLeftSecurity/sast-scan

https://github.com/google/tsunami-security-scanner

https://engineering.fb.com/security/pysa/

https://github.com/SixGenInc/Noctilucent

https://riccardoancarani.github.io/2020-08-08-hunting-for-skeleton-keys/


Espero verlos en la siguiente edición y nos vemos en un año. #KeepOnSafeMode



Comentarios

Lo mas visto