vault backup: 2024-08-31 01:50:46
This commit is contained in:
parent
af9011411c
commit
8c056cb345
34
.obsidian/workspace.json
vendored
34
.obsidian/workspace.json
vendored
|
@ -4,15 +4,19 @@
|
||||||
"type": "split",
|
"type": "split",
|
||||||
"children": [
|
"children": [
|
||||||
{
|
{
|
||||||
"id": "b60c03005b6482a8",
|
"id": "86073634de811326",
|
||||||
"type": "tabs",
|
"type": "tabs",
|
||||||
"children": [
|
"children": [
|
||||||
{
|
{
|
||||||
"id": "21b5784e2023f491",
|
"id": "6d7f4eba18bcabe9",
|
||||||
"type": "leaf",
|
"type": "leaf",
|
||||||
"state": {
|
"state": {
|
||||||
"type": "graph",
|
"type": "markdown",
|
||||||
"state": {}
|
"state": {
|
||||||
|
"file": "templates/legal/Non-Disclosure Agreement.md",
|
||||||
|
"mode": "source",
|
||||||
|
"source": false
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -82,6 +86,7 @@
|
||||||
"state": {
|
"state": {
|
||||||
"type": "backlink",
|
"type": "backlink",
|
||||||
"state": {
|
"state": {
|
||||||
|
"file": "templates/legal/Non-Disclosure Agreement.md",
|
||||||
"collapseAll": false,
|
"collapseAll": false,
|
||||||
"extraContext": false,
|
"extraContext": false,
|
||||||
"sortOrder": "alphabetical",
|
"sortOrder": "alphabetical",
|
||||||
|
@ -98,6 +103,7 @@
|
||||||
"state": {
|
"state": {
|
||||||
"type": "outgoing-link",
|
"type": "outgoing-link",
|
||||||
"state": {
|
"state": {
|
||||||
|
"file": "templates/legal/Non-Disclosure Agreement.md",
|
||||||
"linksCollapsed": false,
|
"linksCollapsed": false,
|
||||||
"unlinkedCollapsed": true
|
"unlinkedCollapsed": true
|
||||||
}
|
}
|
||||||
|
@ -119,7 +125,9 @@
|
||||||
"type": "leaf",
|
"type": "leaf",
|
||||||
"state": {
|
"state": {
|
||||||
"type": "outline",
|
"type": "outline",
|
||||||
"state": {}
|
"state": {
|
||||||
|
"file": "templates/legal/Non-Disclosure Agreement.md"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -139,12 +147,17 @@
|
||||||
"command-palette:Open command palette": false
|
"command-palette:Open command palette": false
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"active": "21b5784e2023f491",
|
"active": "6d7f4eba18bcabe9",
|
||||||
"lastOpenFiles": [
|
"lastOpenFiles": [
|
||||||
|
"templates/legal/Request for Information (RFI).md",
|
||||||
|
"templates/legal/Statement of Work.md",
|
||||||
|
"templates/PASTA.md",
|
||||||
|
"02 - Scoping.md",
|
||||||
|
"01 - Planning.md",
|
||||||
|
"templates/INCIDENT HANDLER'S JOURNAL.md",
|
||||||
|
"tools/0.Bookmark/One-Liners.md",
|
||||||
"README.md",
|
"README.md",
|
||||||
"tools/1.Information-Gathering/Global-Steps.md",
|
"tools/1.Information-Gathering/Global-Steps.md",
|
||||||
"01 - Planning.md",
|
|
||||||
"02 - Scoping.md",
|
|
||||||
"Red Team/1 - Information Gathering/2 - Active Reconnaissance/• AMASS.md",
|
"Red Team/1 - Information Gathering/2 - Active Reconnaissance/• AMASS.md",
|
||||||
"Red Team/1 - Information Gathering/2 - Active Reconnaissance",
|
"Red Team/1 - Information Gathering/2 - Active Reconnaissance",
|
||||||
"Red Team/1 - Information Gathering",
|
"Red Team/1 - Information Gathering",
|
||||||
|
@ -165,11 +178,6 @@
|
||||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/Traceroute.md",
|
"tools/1.Information-Gathering/2.Active-Reconnaissance/Traceroute.md",
|
||||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/Telnet.md",
|
"tools/1.Information-Gathering/2.Active-Reconnaissance/Telnet.md",
|
||||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/Sn1per.md",
|
"tools/1.Information-Gathering/2.Active-Reconnaissance/Sn1per.md",
|
||||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/Netcat.md",
|
|
||||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/DNSenum.md",
|
|
||||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/Curl.md",
|
|
||||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/AMASS.md",
|
|
||||||
"tools/1.Information-Gathering/1.Passive-Reconnaissance/Whois.md",
|
|
||||||
"tools/5.Machine/3.Active-Directory/General/Exploitation/AV-Detection-and-Evasion/Evasion-Techniques/Tools",
|
"tools/5.Machine/3.Active-Directory/General/Exploitation/AV-Detection-and-Evasion/Evasion-Techniques/Tools",
|
||||||
"tools/5.Machine/1.Linux/General/Exploitation/AV-Detection-Evasion/Evasion-Techniques/Tools",
|
"tools/5.Machine/1.Linux/General/Exploitation/AV-Detection-Evasion/Evasion-Techniques/Tools",
|
||||||
"tools/5.Machine/3.Active-Directory/General/Exploitation/AV-Detection-and-Evasion/Evasion-Techniques",
|
"tools/5.Machine/3.Active-Directory/General/Exploitation/AV-Detection-and-Evasion/Evasion-Techniques",
|
||||||
|
|
|
@ -12,6 +12,7 @@ Asses reasons for the assessment. Security, risk assessments, customer personal
|
||||||
Identify Protected Assets
|
Identify Protected Assets
|
||||||
|
|
||||||
[[ASSET INVENTORY]]
|
[[ASSET INVENTORY]]
|
||||||
|
|
||||||
[[RISK REGISTER]]
|
[[RISK REGISTER]]
|
||||||
|
|
||||||
## Compliance
|
## Compliance
|
||||||
|
@ -21,7 +22,9 @@ Example: PCI DSS, GDPR, HIPPA, etc
|
||||||
- Strictly defined surface area of engagement
|
- Strictly defined surface area of engagement
|
||||||
|
|
||||||
[[Statement of Work]]
|
[[Statement of Work]]
|
||||||
|
|
||||||
[[Non-Disclosure Agreement]]
|
[[Non-Disclosure Agreement]]
|
||||||
|
|
||||||
[[Request for Information (RFI)]]
|
[[Request for Information (RFI)]]
|
||||||
|
|
||||||
## Resources
|
## Resources
|
||||||
|
|
94
templates/INCIDENT HANDLER'S JOURNAL.md
Normal file
94
templates/INCIDENT HANDLER'S JOURNAL.md
Normal file
|
@ -0,0 +1,94 @@
|
||||||
|
|
||||||
|
|
||||||
|
| | | | |
|
||||||
|
|---|---|---|---|
|
||||||
|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||||
|
|Description|Provide a brief description about the journal entry.| | |
|
||||||
|
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||||
|
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||||
|
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
| | | | |
|
||||||
|
|---|---|---|---|
|
||||||
|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||||
|
|Description|Provide a brief description about the journal entry.| | |
|
||||||
|
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||||
|
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||||
|
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
| | | | |
|
||||||
|
|---|---|---|---|
|
||||||
|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||||
|
|Description|Provide a brief description about the journal entry.| | |
|
||||||
|
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||||
|
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||||
|
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
| | | | |
|
||||||
|
|---|---|---|---|
|
||||||
|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||||
|
|Description|Provide a brief description about the journal entry.| | |
|
||||||
|
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||||
|
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||||
|
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
| | | | |
|
||||||
|
|---|---|---|---|
|
||||||
|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||||
|
|Description|Provide a brief description about the journal entry.| | |
|
||||||
|
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||||
|
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||||
|
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
| | | | |
|
||||||
|
|---|---|---|---|
|
||||||
|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||||
|
|Description|Provide a brief description about the journal entry.| | |
|
||||||
|
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||||
|
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||||
|
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
### Need another journal entry template?
|
||||||
|
|
||||||
|
If you want to add more journal entries, please copy one of the tables above and paste it into the template to use for future entries.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
| |
|
||||||
|
|---|
|
||||||
|
|Reflections/Notes: Record additional notes.|
|
|
@ -2,8 +2,6 @@
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
| | |
|
| | |
|
||||||
| ------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
|
| ------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
|
||||||
| **Stages** | **Sneaker company** |
|
| **Stages** | **Sneaker company** |
|
||||||
|
|
Loading…
Reference in a new issue