Incident handling, security implementation, and code auditing
How To Start A Career in Cyber Security
Get to know some of the best ways to enter the cyber security field and how to interact with recruiters. We investigate trends, salaries, and credential ROI
Exploitation
Physical Access
Many attacks focus on diret access to a
Netcat
Read and write data across the network, scan for vulnerabilities and more with Netcat.
Vulnerability Scanning
Using tools like Nessus an attacker can check open ports running vulnerable services and exploit them.
Always get permission before performing any type of scanning. Sheldyn and its affiliates are not responsible for any harm done to any network. This is for educational purposes only.
Reconnaissance
Reconnaissance lets light up your network like the 4th of July!
Always get permission before performing any type of reconnaissance. Sheldyn and its affiliates are not responsible for any harm done to any network. This is for educational purposes only.
Lessons Learned in Incident Handling
What happened and how can we improve our capabilities. Immediately after the system is back online in production start developing a follow-up report.
Recovery in Incident Handling
Back to business, as usual, is the goal in the recovery phase of incident handling. Putting systems back into production in a safe manner is important.
Eradication in Incident Handling
With the bleeding stopped, the goal of the eradication phase is to rid the system of any and all artifacts created by the attacker.
Containment in Incident Handling
isolate the threat to stop the attack from spreading to other systems or causing more damage.
Identification in Incident Handling
Identification phase of incident handling involves detecting threats, vulnerabilities, and security incidents.