Index of /downloads/Udemy - Applied Ethical Hacking and Rules of Engagement/22 Practical Attacks & Threat Hunting IoC Use-Cases with Wazuh

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[TXT]external-assets-links.txt2023-10-29 21:26 165  
[VID]002 Run & Detect Shellshock Attack - Linux Endpoint.mp42023-10-29 22:26 23M 
[VID]006 Run & Detect Mimikatz & Pass The Hash Attacks.mp42023-10-29 22:09 33M 
[VID]007 Run & Detect Log Tampering IoC (Someone is deleting his traces).mp42023-10-29 22:08 38M 
[VID]004 Run & Detect Spawn Session and Process Injection.mp42023-10-29 22:30 41M 
[VID]003 Run & Detect MSHTA Session initiation Attack.mp42023-10-29 22:34 56M 
[VID]005 Run & Detect Priv Esc, Lateral Mov. & Exec using PSExec WMIC (Windows Endpoint).mp42023-10-29 22:27 61M 
[VID]001 Run & Detect SSH & RDP Brute Force Attack - Linux & Windows Endpoint.mp42023-10-29 22:22 68M 

Apache/2.4.66 (Debian) Server at storage.dankodavid.hu Port 80