In this session we’re going to simulate an attack from another VM and then observe the attacker’s log. First we create an attacker VM. This VM’s name is attack-vm and also contain a different…
Part 5: Configuring/Collection Windows Security Event Logs and Syslog Logs and for Log Analytics Workspace., by Duyet Bui
OWASP-Testing-Guide-v5/document/4_Web_Application_Security_Testing/4.11_Business_Logic_Testing/4.11.2_Test_Ability_to_Forge_Requests_OTG-BUSLOGIC-002.md at master · 0x4ghs/OWASP-Testing-Guide-v5 · GitHub
Part 5: Configuring/Collection Windows Security Event Logs and Syslog Logs and for Log Analytics Workspace., by Duyet Bui
How to find the source of failed login attempts
Detection, differentiation and localization of replay attack and false data injection attack based on random matrix
Log Validation with Attack Simulation
Log Validation with Attack Simulation
Identify and Prevent Brute Force Attack.
Part 2: Attack Simulation from Another VM & Attacker's Log Inspection (Failed Authentication and Log Observation), by Duyet Bui
Denial of Service Attack Project
Unable to connect SITL to AirSim - Copter Simulation - ArduPilot Discourse
Part 1: Create Windows 10 Pro Virtual Machine and Install SQL Server and Create Vulnerabilities, by Duyet Bui
AZ-303 exam, Failover of a Windows Server VM with Azure Site Recovery