Incident Response Steps
NIST StepsPreparationDetection & AnalysisContainment, Eradication, & RecoveryPost-incident Activity.
All about US Cyber Security.
NIST StepsPreparationDetection & AnalysisContainment, Eradication, & RecoveryPost-incident Activity.
Linux commands: DirectoryList contents of a directory(aka folder): ls, ls -a(for hidden), ls -al. Make a directory(aka folder): mkdirChange into a directory: CD File commandsLocal HostCreate a file: Touch (filename)Read a file: cat (filename) Remote HostSCPRemote copy file with scp: scp user@(ipaddress):(path of file to…
Hello and Welcome to Part 2 of your lab setup, if you followed the first post in this series, we had just finished installing Virtual Box. I know you’re anxious to create your first Virtual Machine, However there is a very important step we need…
My first post is going to be about installing a lab. Utilizing Virtual Box(A free program that allows you to run virtualized environments) Kali Linux(The standard Linux distribution used by most hackers). Don’t worry if you don’t understand everything I just said, as we walk-through…