top of page

WELCOME TO CRONINITY

Woman with Headphones
Clicking on a Tablet
Sleep App
Girl with Tablet
In the Woods
Augmented Reality Glasses
Home: Welcome

Security Logging - Parent Events versus Base Events

Parent Events versus Base Events Concept The diagram below highlights the SOC Triad, with core cybersecurity tools like Network Detection...

Password Cracking - Hashcat

Three password cracking techniques that can be used with the password cracking tool hashcat. The three techniques are: Dictionary based...

Incident Response (IR) - Server/Host Analysis

Host based IR Approach The main categories of alerts come from the following sensor instrumentation: Network sensors Identity sensors...

Mimikatz

The Mimikatz story is fascinating to me. “Mimikatz first became a key hacker asset thanks to its ability to exploit an obscure Windows...

Zeek & Corelight - Encrypted Traffic Collection

Zeek, and Corelight sensors specifically, divide the process of handling and analyzing data into four distinct areas, as illustrated in...

EDR Evaluation - Powershell Activity

Users of Endpoint Detection Response (EDR) systems know they are powerful tools for detecting Threat Actors (TA)'s. But there is often...

Zeek & Corelight - Core Packages

In simple terms, Zeek sensors capture traffic, generate protocol-specific log files for the captured session traffic, and can export...

SOAR Notes

Automation Overview Identify and prioritize processes for automation: Begin with standard, repetitive tasks that can be easily automated,...

Incident Response (IR) Exercises

Incident Response (IR) Exercise Phases Establish Exercise Interval and Planning timelines: First, establish the IR exercise execution...

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
bottom of page