📒
Book of VanLuong
CtrlK
  • 👨‍💻About the Author
  • Cryptography
    • Cryptanalysis
      • RSA & RSA ATTACK
      • DES (Data Encryption Standard)
      • AES (Advanced Encryption Standard)
      • ECC ( Elliptic Curve of Cryptography)
      • Group-based Cryptography
      • Lattice-based Cryptography
      • ChaCha20-Poly1305
      • Hash Function
      • Wargame CTF
  • C2
    • Practical with Havoc Framework
  • Blue Teaming
    • SIEM & SOC
      • SIEM
      • SOC
      • Splunk
    • SIEM Tools
      • Build ELK Lab
        • Configure Elasticsearch and Kibana setup in ubuntu
        • Fluent Bit – Sending Logs to ELK with Fluent Bit
        • Winlogbeat – Collecting and Forwarding Windows Event Logs.
        • Filebeat – Collecting and Forwarding Windows Event Logs.
        • Send Logs from Winlogbeat through Logstash to ELK
        • Audit policy & Winlogbeat
        • Integrations Wazuh and ELK
      • Sysmon configuration
    • PowerShell in Incident Response and Threat Hunting
      • PowerShell For Incident Response
      • PowerShell For Threat Hunting
  • Techniques used in malware
    • DLL side loading
    • DLL Unhooking
    • Call stack spoofing
  • Wazuh App Dashboards for Splunk
  • Cyber Threat Intelligence
    • OpenCTI
      • OpenCTI Overview
      • OpenCTI Installtion
      • OpenCTI Connectors
      • OpenCTI integration with SIEM (Splunk)
      • Enrich IOC using SOAR with OpenCTI, VirusTotal and Shuffler
  • Windows
    • 70 Vital Windows Commands
    • Windows Registry Forensics
    • Windows Command Line
  • Guide to Installing Kali Linux, DVWA, and bWAPP
    • Phần 1. CÀI ĐẶT HỆ ĐIỀU HÀNH KALI LINUX
    • Phần 2. CÀI ĐẶT DVWA
    • Phần 3. CÀI ĐẶT BWAPP
  • CTF
    • CTF-writeup-in-KCSC
  • Red Teaming
    • Active Directory
Powered by GitBook
On this page

Was this helpful?

  1. Cyber Threat Intelligence

OpenCTI

OpenCTI OverviewOpenCTI InstalltionOpenCTI ConnectorsOpenCTI integration with SIEM (Splunk)Enrich IOC using SOAR with OpenCTI, VirusTotal and Shuffler
PreviousCyber Threat IntelligenceNextOpenCTI Overview

Was this helpful?