@BlueSkjaldborg Profile picture

BlueSkjaldborg

@BlueSkjaldborg

Tales for the Skjaldes ⚠️ From high level to low level and back. Everything regarding #blueteam. 🆙️

Similar User
Connected photo

@LucyIsOpal

assume_breach photo

@assume_breach

Shantanu Khandelwal photo

@shantanukhande

Matt Creel photo

@Tw1sm

collfuse.com 🇨🇭 photo

@collfuse

zohyr caicedo photo

@ZohyrC

L’homme qui fait trembler les autres photo

@homme_fait

Bleon Proko photo

@gl4ssesbo1

AriaVP♏ photo

@vp_aria

Beverly Wells photo

@innateself

ferdosisla photo

@ferdosisla23572

Steelers5821 photo

@Steelers5821

dash bs photo

@dashbak

Astra-Tours - mit #zugstattflug nach Osteuropa! photo

@astra_tours

Mapada### photo

@MapisAdams2

Pinned

This was a fun one! Really enjoyed it. @ACEResponder

📢 New Challenge: Locked Up Your domain is infected with ransomware. Take on a unique attack path in this beginner-friendly challenge. #ThreatHunting #DFIR aceresponder.com/challenge/lock…



BlueSkjaldborg Reposted

Periodic Table of Windows Events #ThreatHunting #DFIR #Windows

Tweet Image 1

BlueSkjaldborg Reposted

How Component Object Model (COM) works. #ThreatHunting #DFIR #Windows #Microsoft

Tweet Image 1

BlueSkjaldborg Reposted

How Windows security descriptors work. #ThreatHunting #DFIR #Windows #ActiveDirectory

Tweet Image 1

Interesting challenge @ACEResponder!

📢A new challenge is now available on ACEResponder.com! Investigate an incident that spans a Windows and Linux server environment. #ThreatHunting #DFIR aceresponder.com/challenge/blin…

Tweet Image 1


BlueSkjaldborg Reposted

DLL hijacking techniques #ThreatHunting #DFIR


BlueSkjaldborg Reposted

How character classes work in regular expressions.


BlueSkjaldborg Reposted

How Windows access tokens work. #ThreatHunting #DFIR #Windows

Tweet Image 1

BlueSkjaldborg Reposted

How Kerberos authentication works across domain trusts. #ThreatHunting #DFIR


BlueSkjaldborg Reposted

Don't sleep on @ACEResponder labs and courses, they are very well done and educational.

📢A new challenge is now available on ACEResponder.com! Take on a hybrid #Entra #Azure AD compromise #ThreatHunting #DFIR aceresponder.com/challenge/intu…



BlueSkjaldborg Reposted

How PsExec lateral movement works. #ThreatHunting #DFIR


BlueSkjaldborg Reposted

Windows audit policies, the events they enable and the relative volume of events they generate #ThreatHunting #DFIR

Tweet Image 1

BlueSkjaldborg Reposted

How Stuxnet worked #ThreatHunting #DFIR


BlueSkjaldborg Reposted

Threat Hunting Techniques: Clustering 💠 #ThreatHunting #DFIR

Tweet Image 1

BlueSkjaldborg Reposted

Threat Hunting Techniques: Searching 🔍 #ThreatHunting #DFIR

Tweet Image 1

BlueSkjaldborg Reposted

How NTLM authentication works #ThreatHunting #DFIR


BlueSkjaldborg Reposted

A skeleton key attack patches authentication functions in LSASS. This gives the attacker a master password without changing any user passwords. #ThreatHunting #DFIR


BlueSkjaldborg Reposted

How Kerberos authentication works when the service is configured for unconstrained delegation. #ThreatHunting #DFIR


BlueSkjaldborg Reposted

DCOM lateral movement using Excel ActivateMicrosoftApp() #ThreatHunting #DFIR


Loading...

Something went wrong.


Something went wrong.