Skip to content
CyberOpsSec
CyberOpsSec

Just another cybersecurity site

  • Home
  • Posts
  • Knowledge
    • Auditing
    • Linux Commands
    • Ports & Protocols
    • Scanning
    • Sniffing
    • Syslog
    • Vulnerability/Patch Mgmt
  • About
  • Contact
CyberOpsSec

Just another cybersecurity site

UBI – User Browsing Isolation

Admin, November 8, 2024November 8, 2024

This has been a big topic this year because of a major financial institution being…

Continue Reading

Rolling KRBTGT Account

Admin, September 30, 2024November 8, 2024

It is best practice to roll this account’s password every 180 days or immediately if…

Continue Reading

SentinelOne: Why it’s important to monitor and audit your EPP

Admin, September 5, 2024September 6, 2024

This is often an overlooked crucial step for endpoint protection software. Sometimes EPP can have…

Continue Reading

Nessus False Positive

Admin, June 25, 2024June 25, 2024

Plugin ID: 132101Windows Speculative Execution Configuration Check According to MS: KB4072698: Windows Server and Azure…

Continue Reading

Uninstall Vulnerable Software Remotely

Admin, May 8, 2024June 5, 2024

If you find a ton of boxes running vulnerable software that is no longer used…

Continue Reading

ICMP Timestamp Request Remote Date Disclosure

Admin, May 8, 2024June 5, 2024

You may have seen this vulnerability pop in Nessus. In order to remediate this we…

Continue Reading

Disable mDNS

Admin, March 13, 2024

Issuing netstat and lsof commands to view UDP 5353 connections/listening ports shows that the avahi-daemon…

Continue Reading

AD CS Vulnerabilities

Admin, January 11, 2024March 13, 2024

If an attacker gets domain user level permissions they could use tools such as certipy-ad…

Continue Reading

Blocking Responder

Admin, November 21, 2023March 13, 2024

Responder is usually one of the first things a pentester will fire up after plugging…

Continue Reading

Website

Admin, September 27, 2023November 1, 2023

Hello Interwebs! I will be building this website over the coming months. This will have…

Continue Reading
©2025 CyberOpsSec | WordPress Theme by SuperbThemes