Website Search Result Poisoning

Website Search Result Poisoning

Its not hard to find search pages from websites with compromises. Its as simple as googling it. Actors are actively and easily exploiting misconfigurations in websites to advertise dark web…
Logstash – Sending Windows Event Logs

Logstash – Sending Windows Event Logs

Download Winlogbeat – Download here (64-bit) Step 1: Download and extract winlogbeat.zip to c:\program files\  (Should look like the image below) Step 2: Open the winlogbeat.yml and edit with notepad: We will add the following…
Vulnerability Management with Wazuh

Vulnerability Management with Wazuh

One of the great features in Wazuh is the vulnerabilities module.  Both comparing installed programs against NISTs vulnerability database as well as comparing the installed hot fixes against Microsoft’s update…