Skip to content

Syspanda

SysOps & Security

  • About
  • Donate
  • Newsletter
  • falske tissot ure
  • repliki rolex day date
  • pas cher rolex explorer
  • replica rolex watches
  • Replik Uhren
  • repliki zegarków
  • uk replica watches
  • luksusowe repliki zegarków
  • repliki rolex milgauss
  • pas cher rolex milgauss
  • replica cartier watches
  • replik bremont uhren
  • nike обувки продажба
  • Orologi Rolex Replica
  • replica rolex cellini
by Pablo Delgado on July 18, 2018July 18, 2018 in logstash, Mitre, Threat Hunting

Threat Hunting: Finding Persistence Mechanisms

I wanted to write about the importance of checking for new services as this is an avenue in which attackers leverage their persistence methods. While looking at newly created services… [Continue Reading]

by Pablo Delgado on July 16, 2018July 25, 2018 in logstash

Remote Connection Dashboards: VNC & RDP

Accountability is important, and sometimes we might need to investigate who made certain changes at a specific time, or ensure that our privileged accounts are not logging in to other… [Continue Reading]

by Pablo Delgado on June 8, 2018June 8, 2018 in Active Directory, cisco, vpn

Monitoring VPN Logins & Incorporating them to AD

Two articles ago I covered how to monitor Active Directory using ELK. Now you should be seeing account login information (successful logins, failed logins, lockouts, etc.). However; When looking at… [Continue Reading]

by Pablo Delgado on May 4, 2018July 31, 2018 in logstash, Sysmon, Threat Hunting

Labeling endpoint actions with Logstash – Threat Hunting

There’s been plenty of instances where I have to go through an investigation after a user has clicked on a phishing email and find out what happened later. After performing… [Continue Reading]

by Pablo Delgado on May 3, 2018August 19, 2018 in Active Directory, Elasticsearch, kibana, logstash

Monitoring Active Directory with ELK

Can you tell me where this account is getting locked out from? is a frequent question that I would get often by Help Desk, or anyone in general; therefore, I… [Continue Reading]

by Pablo Delgado on May 1, 2018May 1, 2018 in Elasticsearch, logstash, McAfee

Importing McAfee ePO Threat events to ELK

Since I’ve struggled to get McAfee ePO to send syslogs to my ELK environment, I decided to leverage the SQL JDBC driver and logstash JDBC plug-in to pull threat records… [Continue Reading]

by Pablo Delgado on April 12, 2018April 12, 2018 in logstash, websense

Triton AP-Websense SIEM Logstash Output Configuration

The following configuration will make it easier to parse Syslog messages sent from your Websense appliance to your ELK stack. If you need assistance setting up SIEM integration with Websense… [Continue Reading]

by Pablo Delgado on March 12, 2018March 12, 2018 in Email Security, Exchange, Proofpoint

Tagging Phishing emails with Regex Rules [Proofpoint]

After seeing a vast amount of phishing emails coming through, I’ve decided to implement an additional protection by tagging possible phishing emails by applying my own set of conditions to… [Continue Reading]

by Khoa Nguyen on January 13, 2018January 13, 2018 in Google API, Powershell Scripts, Uncategorized

Google Geocode API with Powershell

I have a work requirement to look up zip codes based on incomplete addresses (street, city, state, etc) – this could be accomplished by going into Google Maps and plugging… [Continue Reading]

by Khoa Nguyen on January 10, 2018January 10, 2018 in Exchange, Powershell Scripts

Exchange – Find Mailboxes with Forwarding Addresses Enabled

This is a quick one but definitely helpful: <# Utilize the -ResultSize Unlimited only when you are done formatting and testing your command. If you have a big Exchange environment,… [Continue Reading]

Posts navigation

Page 1 Page 2 Page 3 … Page 6

Categories

Recent Posts

  • Certifications: Preparing for and passing CCSP! October 24, 2020
  • Interacting with FTP/SFTP using Powershell May 31, 2019
  • Rapid 7 Nexpose Data to Splunk February 19, 2019

Archives

  • October 2020
  • May 2019
  • February 2019
  • November 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • March 2017
  • February 2017
  • December 2016

Recent Comments

  • Mariadb Log In Command Line Canvas - logininfos.com on Executing Scripts with Maria-db Command Line
  • infosecTrain on Certifications: Preparing for and passing CCSP!
  • infosectrain on Certifications: Preparing for and passing CCSP!
  • Mariadb Log In Command Line - How to login in MariaDB with OS user without password ... on Executing Scripts with Maria-db Command Line
  • Tom Miller on Executing Scripts with Maria-db Command Line

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Amazon Associate Disclosure

Pablo Delgado is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites. This Helps us pay the web-hosting and domain renewal each year.

Keep this site online

Copyright © 2025 Syspanda. All Rights Reserved.
Gatsby Theme by FRT