vault backup: 2024-08-31 01:50:46

This commit is contained in:
Anton Nesterov 2024-08-31 01:50:46 +02:00
parent af9011411c
commit 8c056cb345
No known key found for this signature in database
GPG key ID: 59121E8AE2851FB5
4 changed files with 118 additions and 15 deletions

View file

@ -4,15 +4,19 @@
"type": "split",
"children": [
{
"id": "b60c03005b6482a8",
"id": "86073634de811326",
"type": "tabs",
"children": [
{
"id": "21b5784e2023f491",
"id": "6d7f4eba18bcabe9",
"type": "leaf",
"state": {
"type": "graph",
"state": {}
"type": "markdown",
"state": {
"file": "templates/legal/Non-Disclosure Agreement.md",
"mode": "source",
"source": false
}
}
}
]
@ -82,6 +86,7 @@
"state": {
"type": "backlink",
"state": {
"file": "templates/legal/Non-Disclosure Agreement.md",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
@ -98,6 +103,7 @@
"state": {
"type": "outgoing-link",
"state": {
"file": "templates/legal/Non-Disclosure Agreement.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
}
@ -119,7 +125,9 @@
"type": "leaf",
"state": {
"type": "outline",
"state": {}
"state": {
"file": "templates/legal/Non-Disclosure Agreement.md"
}
}
}
]
@ -139,12 +147,17 @@
"command-palette:Open command palette": false
}
},
"active": "21b5784e2023f491",
"active": "6d7f4eba18bcabe9",
"lastOpenFiles": [
"templates/legal/Request for Information (RFI).md",
"templates/legal/Statement of Work.md",
"templates/PASTA.md",
"02 - Scoping.md",
"01 - Planning.md",
"templates/INCIDENT HANDLER'S JOURNAL.md",
"tools/0.Bookmark/One-Liners.md",
"README.md",
"tools/1.Information-Gathering/Global-Steps.md",
"01 - Planning.md",
"02 - Scoping.md",
"Red Team/1 - Information Gathering/2 - Active Reconnaissance/• AMASS.md",
"Red Team/1 - Information Gathering/2 - Active Reconnaissance",
"Red Team/1 - Information Gathering",
@ -165,11 +178,6 @@
"tools/1.Information-Gathering/2.Active-Reconnaissance/Traceroute.md",
"tools/1.Information-Gathering/2.Active-Reconnaissance/Telnet.md",
"tools/1.Information-Gathering/2.Active-Reconnaissance/Sn1per.md",
"tools/1.Information-Gathering/2.Active-Reconnaissance/Netcat.md",
"tools/1.Information-Gathering/2.Active-Reconnaissance/DNSenum.md",
"tools/1.Information-Gathering/2.Active-Reconnaissance/Curl.md",
"tools/1.Information-Gathering/2.Active-Reconnaissance/AMASS.md",
"tools/1.Information-Gathering/1.Passive-Reconnaissance/Whois.md",
"tools/5.Machine/3.Active-Directory/General/Exploitation/AV-Detection-and-Evasion/Evasion-Techniques/Tools",
"tools/5.Machine/1.Linux/General/Exploitation/AV-Detection-Evasion/Evasion-Techniques/Tools",
"tools/5.Machine/3.Active-Directory/General/Exploitation/AV-Detection-and-Evasion/Evasion-Techniques",

View file

@ -12,6 +12,7 @@ Asses reasons for the assessment. Security, risk assessments, customer personal
Identify Protected Assets
[[ASSET INVENTORY]]
[[RISK REGISTER]]
## Compliance
@ -21,7 +22,9 @@ Example: PCI DSS, GDPR, HIPPA, etc
- Strictly defined surface area of engagement
[[Statement of Work]]
[[Non-Disclosure Agreement]]
[[Request for Information (RFI)]]
## Resources

View file

@ -0,0 +1,94 @@
| | | | |
|---|---|---|---|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|Description|Provide a brief description about the journal entry.| | |
|Tool(s) used|List any cybersecurity tools that were used.| | |
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|Additional notes|Include any additional thoughts, questions, or findings.| | |
---
| | | | |
|---|---|---|---|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|Description|Provide a brief description about the journal entry.| | |
|Tool(s) used|List any cybersecurity tools that were used.| | |
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|Additional notes|Include any additional thoughts, questions, or findings.| | |
---
| | | | |
|---|---|---|---|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|Description|Provide a brief description about the journal entry.| | |
|Tool(s) used|List any cybersecurity tools that were used.| | |
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|Additional notes|Include any additional thoughts, questions, or findings.| | |
---
| | | | |
|---|---|---|---|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|Description|Provide a brief description about the journal entry.| | |
|Tool(s) used|List any cybersecurity tools that were used.| | |
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|Additional notes|Include any additional thoughts, questions, or findings.| | |
---
| | | | |
|---|---|---|---|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|Description|Provide a brief description about the journal entry.| | |
|Tool(s) used|List any cybersecurity tools that were used.| | |
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|Additional notes|Include any additional thoughts, questions, or findings.| | |
---
| | | | |
|---|---|---|---|
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|Description|Provide a brief description about the journal entry.| | |
|Tool(s) used|List any cybersecurity tools that were used.| | |
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|Additional notes|Include any additional thoughts, questions, or findings.| | |
### Need another journal entry template?
If you want to add more journal entries, please copy one of the tables above and paste it into the template to use for future entries.
---
| |
|---|
|Reflections/Notes: Record additional notes.|

View file

@ -2,8 +2,6 @@
---
| | |
| ------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| **Stages** | **Sneaker company** |