{"id":28,"date":"2020-05-25T19:00:07","date_gmt":"2020-05-25T19:00:07","guid":{"rendered":"http:\/\/pb-art.pl\/?p=28"},"modified":"2020-06-12T06:23:46","modified_gmt":"2020-06-12T06:23:46","slug":"narzedzia-bezpieczenstwa","status":"publish","type":"post","link":"https:\/\/pb-art.pl\/index.php\/2020\/05\/25\/narzedzia-bezpieczenstwa\/","title":{"rendered":"Narz\u0119dzia bezpiecze\u0144stwa"},"content":{"rendered":"\n<p>W trakcie analizy zdarze\u0144 bezpiecze\u0144stwa warto korzysta\u0107 z dobrodziejstwa Internetu. Wiele m\u0105drych g\u0142\u00f3w wymy\u015bli\u0142o przed nami jak rozwi\u0105za\u0107 jaki\u015b problem, staram si\u0119 korzysta\u0107 z dost\u0119pnych pomocy. Poni\u017cej znajdziesz list\u0119 niekt\u00f3rych narz\u0119dzie jak i ciekawe stron\u0119 kt\u00f3re mo\u017ce Ci pomog\u0105 w lepszym zrozumieniu Bezpiecze\u0144stwa IT.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Analiza incydent\u00f3w &#8211; networek\/endpoint<\/h1>\n\n\n\n<ul class=\"wp-block-list\"><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.virustotal.com\/\" target=\"_blank\">www.virustotal.com<\/a><\/li><li><a rel=\"noreferrer noopener\" href=\"http:\/\/www.o365atp.com\/\" target=\"_blank\">http:\/\/www.o365atp.com\/<\/a>&nbsp;&#8211; O365 safe link checker<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.hybrid-analysis.com\/\" target=\"_blank\">https:\/\/www.hybrid-analysis.com\/<\/a>&nbsp;&#8211; file\/url check<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/mxtoolbox.com\/\" target=\"_blank\">https:\/\/mxtoolbox.com\/<\/a>&nbsp;&#8211; mail header<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.browserling.com\/\" target=\"_blank\">https:\/\/www.browserling.com\/<\/a>&nbsp;&#8211; sandbox for url checks<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/scanurl.io\/\" target=\"_blank\">https:\/\/scanurl.io<\/a>&nbsp;&#8211; skanowanie url<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/metadefender.opswat.com\/#!\/\" target=\"_blank\">https:\/\/metadefender.opswat.com\/#!\/<\/a>&nbsp;&#8211;&nbsp;<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/userstack.com\/\" target=\"_blank\">https:\/\/userstack.com\/<\/a>&#8211; useragent check<\/li><li>http:\/\/whois.domaintools.com\/<\/li><li>https:\/\/viewdns.info\/<\/li><li>https:\/\/app.any.run\/<\/li><li>https:\/\/cve.mitre.org\/cve\/search_cve_list.html<\/li><li>https:\/\/nvd.nist.gov\/search<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/cryptii.com\/\" target=\"_blank\">https:\/\/cryptii.com\/<\/a>&nbsp;&#8211; encode\/decode<\/li><li>https:\/\/www.base64decode.org\/<\/li><li>http:\/\/veriscommunity.net\/incident-track.html<\/li><li>https:\/\/blog.thehive-project.org\/category\/analyzers\/page\/2\/<\/li><li><\/li><\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">Learning<\/h1>\n\n\n\n<ul class=\"wp-block-list\"><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.hackthebox.eu\/\" target=\"_blank\">https:\/\/www.hackthebox.eu\/<\/a>&nbsp;&#8211; typowy CTF<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/overthewire.org\/wargames\/\" target=\"_blank\">https:\/\/overthewire.org\/wargames\/<\/a>&nbsp;&#8211; CTF od zera do bohatera<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.cybrary.it\/\" target=\"_blank\">https:\/\/www.cybrary.it\/<\/a>&nbsp;&#8211; sporo materialow szkoleniowych<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.udemy.com\/\" target=\"_blank\">https:\/\/www.udemy.com<\/a>&nbsp;&#8211; platne ale i darmowe materialy szkoleniowe<\/li><li>https:\/\/www.hackers-arise.com\/<\/li><li>https:\/\/www.vulnhub.com\/<\/li><li>https:\/\/n0where.net\/<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Nice to have \/ nice to know<\/h1>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.elastic.co\/elastic-stack\">https:\/\/www.elastic.co\/elastic-stack<\/a><\/li><li><a href=\"https:\/\/www.logpoint.com\/en\/download-logpoint\/\">https:\/\/www.logpoint.com\/en\/download-logpoint\/<\/a><\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/thehive-project.org\/\" target=\"_blank\">https:\/\/thehive-project.org\/<\/a>&nbsp;&#8211; SECURITY INCIDENT RESPONSE FOR THE MASSES SCALABLE, OPEN SOURCE AND FREE SOLUTIONS<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.misp-project.org\/index.html\" target=\"_blank\">https:\/\/www.misp-project.org\/index.html<\/a>&nbsp;&#8211; MISP &#8211; Open Source Threat Intelligence Platform &amp; Open Standards For Threat Information Sharing<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/Neo23x0\/sigma\" target=\"_blank\">https:\/\/github.com\/Neo23x0\/sigma<\/a>&nbsp;&#8211; tworzenie regul korelacyjnych w SIEM<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\">https:\/\/attack.mitre.org\/<\/a>&nbsp;&#8211;&nbsp;globally-accessible knowledge base of adversary tactics and techniques based on real-world observations<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/developer.ibm.com\/qradar\/ce\/\" target=\"_blank\">https:\/\/developer.ibm.com\/qradar\/ce\/<\/a>&nbsp;&#8211; darmowy qradar z ograniczeniami<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.rapid7.com\/info\/nexpose-community\/\" target=\"_blank\">https:\/\/www.rapid7.com\/info\/nexpose-community\/<\/a>&nbsp;&#8211; Limited Functionality of Nexpose for 1 year<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.rapid7.com\/info\/nexpose-trial\/\" target=\"_blank\">https:\/\/www.rapid7.com\/info\/nexpose-trial\/<\/a>&nbsp;&#8211; Free Nexpose 30-Day Trial<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.splunk.com\/en_us\/download.html\" target=\"_blank\">https:\/\/www.splunk.com\/en_us\/download.html#<\/a>&nbsp;&#8211; free limited<\/li><li>www.cisecurity.org\/controls\/cis-controls-list\/<\/li><li>https:\/\/www.alienvault.com\/open-threat-exchange<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/BloodHoundAD\/BloodHound\" target=\"_blank\">https:\/\/github.com\/BloodHoundAD\/BloodHound<\/a>&nbsp;&#8211;&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=lxd2rerVsLo\" target=\"_blank\">https:\/\/www.youtube.com\/watch?v=lxd2rerVsLo<\/a>&nbsp;bardzo fajne narzedzie do wyciagania danych z domeny \ud83d\ude42&nbsp; &nbsp;&#8211; BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment. &#8211;&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=Pn7GWRXfgeI\" target=\"_blank\">https:\/\/www.youtube.com\/watch?v=Pn7GWRXfgeI<\/a>&nbsp;<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/neo4j.com\/\" target=\"_blank\">https:\/\/neo4j.com\/<\/a>&nbsp;&#8211;&nbsp;<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.incidentresponse.com\/playbooks\/\" target=\"_blank\">https:\/\/www.incidentresponse.com\/playbooks\/<\/a>&nbsp;&#8211; The Incident Response Playbook Designer is here to help teams prepare for and handle incidents without worrying about missing a critical step.<\/li><li>https:\/\/www.cyberbit.com\/solutions\/security-operations-automation-orchestration\/<\/li><li><a href=\"https:\/\/github.com\/BloodHoundAD\/BloodHound\">https:\/\/github.com\/BloodHoundAD\/BloodHound<\/a> &#8211; BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>W trakcie analizy zdarze\u0144 bezpiecze\u0144stwa warto korzysta\u0107 z dobrodziejstwa Internetu. Wiele m\u0105drych g\u0142\u00f3w wymy\u015bli\u0142o przed nami jak rozwi\u0105za\u0107 jaki\u015b problem,<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-28","post","type-post","status-publish","format-standard","hentry","category-itsec","comments-off"],"_links":{"self":[{"href":"https:\/\/pb-art.pl\/index.php\/wp-json\/wp\/v2\/posts\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pb-art.pl\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pb-art.pl\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pb-art.pl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pb-art.pl\/index.php\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":2,"href":"https:\/\/pb-art.pl\/index.php\/wp-json\/wp\/v2\/posts\/28\/revisions"}],"predecessor-version":[{"id":34,"href":"https:\/\/pb-art.pl\/index.php\/wp-json\/wp\/v2\/posts\/28\/revisions\/34"}],"wp:attachment":[{"href":"https:\/\/pb-art.pl\/index.php\/wp-json\/wp\/v2\/media?parent=28"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pb-art.pl\/index.php\/wp-json\/wp\/v2\/categories?post=28"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pb-art.pl\/index.php\/wp-json\/wp\/v2\/tags?post=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}