In this post I’ll explain how to detect an attacker that uses PsExec to connect to your computer when you don’t have visibility over the attacker’s computer.
In this post, I’ll explain how to initially setup a SIEM so you can receive your first logs.
The fact that we didn’t know Defender blocked an attack and we only learned it when we receive the report should be considered a disaster!
In the following days, I’ll write a few blog posts explaining how to easily learn to use a SIEM.
You’ve hardened all you could on your servers or computers, and think your secure? Think again!
Passionate about information security, development and technology in general, I like to share my experience with different technologies. I also love travel!