Skip to content
CyberOpsSec
CyberOpsSec

Just another cybersecurity site

  • Home
  • Posts
  • Knowledge
    • Auditing
    • Linux Commands
    • Ports & Protocols
    • Scanning
    • Sniffing
    • Syslog
    • Vulnerability/Patch Mgmt
  • About
  • Contact
CyberOpsSec

Just another cybersecurity site

MSSQL Auditing

Admin, August 11, 2025August 11, 2025

MSSQL auditing is configured separately from Windows auditing. To audit MSSQL you need to create…

Continue Reading

BloodHound CE Setup

Admin, June 24, 2025August 11, 2025

I’ve always had trouble getting BH running properly and finally decided to make a post…

Continue Reading

UBI – User Browsing Isolation

Admin, November 8, 2024August 11, 2025

This has been a big topic this year because of a major financial institution being…

Continue Reading

Rolling KRBTGT Account

Admin, September 30, 2024August 11, 2025

It is best practice to roll this account’s password every 180 days or immediately if…

Continue Reading

SentinelOne: Why it’s important to monitor and audit your EPP

Admin, September 5, 2024August 11, 2025

This is often an overlooked crucial step for endpoint protection software. Sometimes EPP can have…

Continue Reading

Nessus False Positive

Admin, June 25, 2024August 11, 2025

Plugin ID: 132101Windows Speculative Execution Configuration Check According to MS: KB4072698: Windows Server and Azure…

Continue Reading

Uninstall Vulnerable Software Remotely

Admin, May 8, 2024August 11, 2025

If you find a ton of boxes running vulnerable software that is no longer used…

Continue Reading

ICMP Timestamp Request Remote Date Disclosure

Admin, May 8, 2024August 11, 2025

You may have seen this vulnerability pop in Nessus. In order to remediate this we…

Continue Reading

Disable mDNS

Admin, March 13, 2024August 11, 2025

Issuing netstat and lsof commands to view UDP 5353 connections/listening ports shows that the avahi-daemon…

Continue Reading

AD CS Vulnerabilities

Admin, January 11, 2024August 11, 2025

If an attacker gets domain user level permissions they could use tools such as certipy-ad…

Continue Reading
  • 1
  • 2
  • Next
©2025 CyberOpsSec | WordPress Theme by SuperbThemes