top of page

WELCOME TO CRONINITY

Woman with Headphones
Clicking on a Tablet
Sleep App
Girl with Tablet
In the Woods
Augmented Reality Glasses
Home: Welcome
Search

Password Cracking - Hashcat

Three password cracking techniques that can be used with the password cracking tool hashcat. The three techniques are: Dictionary based...

SSL Heartbleed

The term "heartbleed" is a play off of the word "heartbeat" which was the OpenSSL function exploited for the attack. The VOX article,...

Mimikatz

The Mimikatz story is fascinating to me. “Mimikatz first became a key hacker asset thanks to its ability to exploit an obscure Windows...

EDR Evaluation - Powershell Activity

Users of Endpoint Detection Response (EDR) systems know they are powerful tools for detecting Threat Actors (TA)'s. But there is often...

Zeek & Corelight - Core Packages

In simple terms, Zeek sensors capture traffic, generate protocol-specific log files for the captured session traffic, and can export...

SOAR Notes

Automation Overview Identify and prioritize processes for automation: Begin with standard, repetitive tasks that can be easily automated,...

Mitre ATT&CK based SOC Assessments

SOC assessments: Set a reference for SOC capabilities. Identify detection engineering data-source gaps Identify detection engineering use...

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
bottom of page