All the books and articles that I’ve read and found interesting. ๐ reading now, โ๏ธ - read.
Purple Team
Copied from LinkedIn [๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐ / ๐๐๐๐๐๐ ๐๐๐๐]
Purple Team is born from the collaboration between Red Team and Blue Team. But what is it exactly? Check out this resources to know more about it
๐ ๐ช๐ต๐ฎ๐ ๐ถ๐ ๐ฃ๐๐ฟ๐ฝ๐น๐ฒ ๐ง๐ฒ๐ฎ๐บ ๐ The Difference Between Red, Blue, and Purple Teams by Daniel Miessler https://lnkd.in/ePj9PdJn ๐ Purple Teaming for dummies by Jonathan Relber, Ben Opel and Carl Wright: https://lnkd.in/g45jnejT ๐ ENTERPRISE PURPLE TEAMING: AN EXPLORATORY QUALITATIVE STUDY (๐๐๐๐ ๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐๐) by Xena Olsen, DSc, MBA , Ch33r10 https://lnkd.in/gnGFfPbR
๐ ๐ฃ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ ๐ฎ๐ป๐ฑ ๐ง๐ถ๐ฝ๐ ๐ Check out this training by Christian Scott & Travis DeForge and register for ๐จ๐๐ผ๐บ๐ผ๐ฟ๐ฟ๐ผ๐’๐ ๐๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด ๐๐ฒ๐๐๐ถ๐ผ๐ป๐จ where you learn about Purple Teaming work and building a purpleteaming lab https://lnkd.in/eimvjzwE ๐ Purple Team Exercise Framework by SCYTHE https://lnkd.in/e3cnDETB ๐ Purple Teaming learning Path on AttackIQ https://lnkd.in/e3s_MrCA ๐ Actionable Purple Teaming: Why and How You Can (and Should) Go Purple by Scythe https://lnkd.in/geNgDbsK ๐ A post by Julien Provenzano โ with a hands-on Purple Team Workshop by Scythe and Jorge Orchilles https://lnkd.in/eRMv6-2m
๐ ๐ง๐ผ๐ผ๐น๐ ๐ PlumHound by Black Hills Information Security https://lnkd.in/ee2WJZQb ๐ PurpleSharp by Mauricio Velazco https://lnkd.in/eHYZPWem
๐จ๐จ ๐๐๐๐๐ - Do you know other resources? Please share them in the comment๐จ๐จ
โก๏ธ ๐ ๐๐๐๐๐ ๐๐ on github for more pentest tips: https://github.com/CSbyGB โฌ ๏ธ
Forensics
- Digital forensics Diary series โ๏ธ
- Practical Malware Analysis โ๏ธ
- File System ๐
- eForensics Magazine ๐
- MacOS Forensics
- Hiding and carving data
- Threat Hunting
- https://github.com/cugu/awesome-forensics
NTFS
[1] Maxim Suhanov’s blog, containing lots of research of NTFS. He also writes general DFIR and reverse engineering articles. His twitter acc.
- https://eforensicsmag.com/course/ntfs-forensics-w40/ (use the course plan to plan your study)
macOS and Linux Forensics
โ https://digitalforensicsurvivalpodcast.com/2022/06/27/dfsp-332-bash-histories/ ๐ https://github.com/Dead-Simple-Scripts/AutoLLR - use the script to get how to perform and what artefacts to collect on a Linux and macOS machine.
๐ฅ Sarah Edwards is the main researcher in this field.
Cloud Forensics
Windows Forensics
SANS Courses of interest
FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics FOR518: Mac and iOS Forensic Analysis and Incident Response FOR509: Enterprise Cloud Forensics and Incident Response
FOR589: Dark Web Threat Hunting & Blockchain Forensics - NEW SANS DFIR Course FOR528: Ransomware for Incident Responders FOR608: Enterprise-Class Incident Response & Threat Hunting
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques FOR710: Reverse-Engineering Malware: Advanced Code Analysis
Case Studies
https://digitalforensicsurvivalpodcast.com/2021/09/28/dfsp-293-case-study-ransomware/ https://digitalforensicsurvivalpodcast.com/2021/11/16/dfsp-300-case-study-ocean-lotus/
Crypto
- MIT
- https://ocw.mit.edu/courses/6-875-cryptography-and-cryptanalysis-spring-2005/
- https://ocw.mit.edu/courses/6-876j-advanced-topics-in-cryptography-spring-2003/
- https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/
- https://ocw.mit.edu/courses/15-s12-blockchain-and-money-fall-2018/
- Coursera
Pentest
- Web Application Hacking Handbook โ๏ธ
- Hacking: the Art of Exploitation ๐
- Pentest Diary Series ๐
General
- Code, Charles Pitzhold ๐
- MIT lectures https://ocw.mit.edu/courses/6-858-computer-systems-security-fall-2014/resources/lecture-1-introduction-threat-models/
Podcasts
โ๏ธ means subscribed, โ means I now listen to it regularily
- SANS DFIR WebCast
- SANS Stormcenter
- Digital Forensics Survival Podcast โ
- SANS Blueprint
- Darknet Diaries
Blogs
Mathmetics
- Brilliant idea: https://mathigon.org/course/probability/monty-hall. I hope this project will evolve further
- Khan Academy, of course
- https://www.coursera.org/specializations/mathematics-machine-learning for machine learning
- https://howtolearnmachinelearning.com/
Courses
- Udemy Compute Forensics
- Udemy Mobile Forensics
- Udemy Network Forensics
- Udemy SDF Prefetch Forensics ๐
- Udemy SDF Memory Forensics 1
- Udemy SDF Memory Forensics 2 ๐ โ
- Udemy SDF RAM Extraction Fundamentals โ
- Udemy SDF LNK
- Udemy SDF Windows Shellbags
- Udemy SDF Shimcache
- Udemy SDF Weblog
- Udemy SDF Windows Explorer
- Udemy SDF Shadow Copy
- Udemy SDF Resolving Attached USBs
- Udemy SDF Imaging a Mac Fusion Drive (low priority)
- Udemy SDF Understanding OSX Timestamps (low priority)
- Udemy Python for Forensics ๐