Looking for some help/guidance.
Reddit » Netsecstudents
by /u/kernelshinobi
3h ago
Hi Everyone, I am living at a PG (paying guest) residence on rent. The WiFi is there however whenever I connect to it using an Android device, it shows a suspiciously shared storage with the name of a person available on the local network. I don't see the storage when I connect to the WiFi on my Macbook or my Linux box. This makes me wonder if it is an exploit? How can I confirm? I talked to the owner of this residence and they said the person whose name shows up lives in another room and is not here from sometime. I just want to know what I can do to decipher the meaning here? Is it a storag ..read more
Visit website
Hello everyone. I'm new student here.
Reddit » Netsecstudents
by /u/Kouame-Theo0747
3d ago
submitted by /u/Kouame-Theo0747 [visit reddit] [comments ..read more
Visit website
What do you advise me to learn?
Reddit » Netsecstudents
by /u/ZakariaBouchentouf
3d ago
I have recently learn BurpSuite tool by coincidence and I am amazed at what you can do with such tools. From your experience, can you tell me the name of another useful tool in this field with a little hint on how it works? submitted by /u/ZakariaBouchentouf [visit reddit] [comments ..read more
Visit website
Week in Brief #50: Postman API Credential Leaks, DHS AI Threat Guidelines, Effective Risk Communication, Cybersecurity Analyst Insights
Reddit » Netsecstudents
by /u/mandos_io
3d ago
submitted by /u/mandos_io [visit reddit] [comments ..read more
Visit website
Starting my cyber security journey on cisco.
Reddit » Netsecstudents
by /u/Designer_Ad8033
3d ago
I'm currently enrolled in the cisco cyber security roadmap. it's a set of courses cisco is giving for free to prepare you for the CCST certificate. i already have basic knowledge in computer components (i study computer and communication engineering in college), and i was wondering how good the roadmap is and what's the next step is after i finish it? submitted by /u/Designer_Ad8033 [visit reddit] [comments ..read more
Visit website
How to: Parsing AuditD Syslog in Microsoft Sentinel with a function and combining the events by EventID
Reddit » Netsecstudents
by /u/thattechkitten
3d ago
New Article on how to parse AuditD events in Microsoft Sentinel for threat hunting and threat detection. https://medium.com/@truvis.thornton/how-to-parsing-auditd-syslog-in-microsoft-sentinel-with-a-function-and-combining-the-events-by-eve-a65f418cfef1 submitted by /u/thattechkitten [visit reddit] [comments ..read more
Visit website
How-To Install and Setup: Azure Arc, (AMA) Azure Monitor Agent and (DCR) Data Collection Rules for sending Linux Syslog to Sentinel for Threat Hunting and Security Monitoring with AuditD
Reddit » Netsecstudents
by /u/thattechkitten
5d ago
New Article on how to quickly get Syslog/AuditD logs to Microsoft Sentinel for threat hunting and detection building using AuditD. https://medium.com/@truvis.thornton/how-to-install-and-setup-azure-arc-ama-azure-monitor-agent-and-dcr-data-collection-rules-for-47381ee9d312 submitted by /u/thattechkitten [visit reddit] [comments ..read more
Visit website
Microsoft Developer Blogs Search Tool
Reddit » Netsecstudents
by /u/elliotkillick
5d ago
submitted by /u/elliotkillick [visit reddit] [comments ..read more
Visit website
How does Knowbe4 do it? How would I start?
Reddit » Netsecstudents
by /u/Hot_Worldliness_6835
1w ago
I also posted in r/cybersecurity Adding my main question here: how do you build a reliable long term infrastructure for postfix or otherwise for legit phishing as a service awareness consulting? Context: I am a netsec student who has some experience managing Knowbe4 campaigns and want to offer a solution for local businesses at a cheaper cost. How does Knowbe4 manage their infrastructure? I have been looking around at solutions like kingfisher and gophish etc. but it all comes down to the mail server. Amazon SES won't let you send phishing, sendmail and others are all against TOS. They also w ..read more
Visit website
Network architectures for guest Wi-Fi networks
Reddit » Netsecstudents
by /u/Big-Razzmatazz3034
1w ago
I am studying a network diagram, and found that the guest Wi-Fi and staff Wi-Fi are on separate VLANs but under the same switch, and both VLANs are within the perimeter firewall, what are the potential security concerns or vulnerabilities that could arise from this configuration? Considering that the guest Wi-Fi network is typically considered untrusted, is it advisable to place the guest Wi-Fi network outside the perimeter firewall, in a separate DMZ? What are the advantages and disadvantages of this approach? What are the common practices or industry standards for designing network architec ..read more
Visit website

Follow Reddit » Netsecstudents on FeedSpot

Continue with Google
Continue with Apple
OR