Guide to Self-Learning Windows and Active Directory: Part II

1. WINDOWS INTERNALS

2. SYSINTERNALS

winget install sysinternals

3. OPEN SPECIFICATIONS

4. IPC, LPC, ALPC, RPC, OLE, COM, DCOM, OH MY

5. CIS BENCHMARKS AND STIGS

  • Level 1: Not likely to cause utility and performance impacts in production
  • Level 2: A bit more hardened and may have utility and performance impacts
  • Next Generation: Likely to run into incompatibilities in production and requires a lot of testing before implementation in production
  • STIG: DoD recommendations; overlap with above levels; expect utility and performance impacts
  • Automated — audits of suggested security implementations can be automated
  • Manual — audits require additional manual steps to confirm the security measures are in place

--

--

--

Cyber Gamer

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Escape Prison 2 Hack Free Resources Generator

When It Comes to Endpoint Security, We Are All Fighting the Same Battles

Information Security — Do’s & Don’ts

[Day 20] Blue Teaming What’s the Worst That Could Happen? | Advent of Cyber 3 (2021)

The Implantable Computer Project

COVID Case Tracking Using FOSS

InterContinental Hotel Chain Breach Expands

An Intercontinental hotel in New York City.

Frontrunner Router Breakdown

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
EricaZelic

EricaZelic

Cyber Gamer

More from Medium

Hands-on Analysis on Agent Smith- The Andro-Malware

SOC164 — Suspicious Mshta Behavior Let’s Defend writeup

Beginners Guide to Self-Learning Windows and Active Directory: Part 1

TRY HACK ME: Intro to Digital Forensics Write-Up