vault backup: 2024-08-31 01:50:46
This commit is contained in:
parent
af9011411c
commit
8c056cb345
34
.obsidian/workspace.json
vendored
34
.obsidian/workspace.json
vendored
|
@ -4,15 +4,19 @@
|
|||
"type": "split",
|
||||
"children": [
|
||||
{
|
||||
"id": "b60c03005b6482a8",
|
||||
"id": "86073634de811326",
|
||||
"type": "tabs",
|
||||
"children": [
|
||||
{
|
||||
"id": "21b5784e2023f491",
|
||||
"id": "6d7f4eba18bcabe9",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "graph",
|
||||
"state": {}
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "templates/legal/Non-Disclosure Agreement.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
|
@ -82,6 +86,7 @@
|
|||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "templates/legal/Non-Disclosure Agreement.md",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
|
@ -98,6 +103,7 @@
|
|||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "templates/legal/Non-Disclosure Agreement.md",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
|
@ -119,7 +125,9 @@
|
|||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {}
|
||||
"state": {
|
||||
"file": "templates/legal/Non-Disclosure Agreement.md"
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
|
@ -139,12 +147,17 @@
|
|||
"command-palette:Open command palette": false
|
||||
}
|
||||
},
|
||||
"active": "21b5784e2023f491",
|
||||
"active": "6d7f4eba18bcabe9",
|
||||
"lastOpenFiles": [
|
||||
"templates/legal/Request for Information (RFI).md",
|
||||
"templates/legal/Statement of Work.md",
|
||||
"templates/PASTA.md",
|
||||
"02 - Scoping.md",
|
||||
"01 - Planning.md",
|
||||
"templates/INCIDENT HANDLER'S JOURNAL.md",
|
||||
"tools/0.Bookmark/One-Liners.md",
|
||||
"README.md",
|
||||
"tools/1.Information-Gathering/Global-Steps.md",
|
||||
"01 - Planning.md",
|
||||
"02 - Scoping.md",
|
||||
"Red Team/1 - Information Gathering/2 - Active Reconnaissance/• AMASS.md",
|
||||
"Red Team/1 - Information Gathering/2 - Active Reconnaissance",
|
||||
"Red Team/1 - Information Gathering",
|
||||
|
@ -165,11 +178,6 @@
|
|||
"tools/1.Information-Gathering/2.Active-Reconnaissance/Traceroute.md",
|
||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/Telnet.md",
|
||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/Sn1per.md",
|
||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/Netcat.md",
|
||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/DNSenum.md",
|
||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/Curl.md",
|
||||
"tools/1.Information-Gathering/2.Active-Reconnaissance/AMASS.md",
|
||||
"tools/1.Information-Gathering/1.Passive-Reconnaissance/Whois.md",
|
||||
"tools/5.Machine/3.Active-Directory/General/Exploitation/AV-Detection-and-Evasion/Evasion-Techniques/Tools",
|
||||
"tools/5.Machine/1.Linux/General/Exploitation/AV-Detection-Evasion/Evasion-Techniques/Tools",
|
||||
"tools/5.Machine/3.Active-Directory/General/Exploitation/AV-Detection-and-Evasion/Evasion-Techniques",
|
||||
|
|
|
@ -12,6 +12,7 @@ Asses reasons for the assessment. Security, risk assessments, customer personal
|
|||
Identify Protected Assets
|
||||
|
||||
[[ASSET INVENTORY]]
|
||||
|
||||
[[RISK REGISTER]]
|
||||
|
||||
## Compliance
|
||||
|
@ -21,7 +22,9 @@ Example: PCI DSS, GDPR, HIPPA, etc
|
|||
- Strictly defined surface area of engagement
|
||||
|
||||
[[Statement of Work]]
|
||||
|
||||
[[Non-Disclosure Agreement]]
|
||||
|
||||
[[Request for Information (RFI)]]
|
||||
|
||||
## Resources
|
||||
|
|
94
templates/INCIDENT HANDLER'S JOURNAL.md
Normal file
94
templates/INCIDENT HANDLER'S JOURNAL.md
Normal file
|
@ -0,0 +1,94 @@
|
|||
|
||||
|
||||
| | | | |
|
||||
|---|---|---|---|
|
||||
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||
|Description|Provide a brief description about the journal entry.| | |
|
||||
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||
|
||||
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
||||
| | | | |
|
||||
|---|---|---|---|
|
||||
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||
|Description|Provide a brief description about the journal entry.| | |
|
||||
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||
|
||||
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
||||
| | | | |
|
||||
|---|---|---|---|
|
||||
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||
|Description|Provide a brief description about the journal entry.| | |
|
||||
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||
|
||||
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
||||
| | | | |
|
||||
|---|---|---|---|
|
||||
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||
|Description|Provide a brief description about the journal entry.| | |
|
||||
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||
|
||||
|
||||
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
||||
| | | | |
|
||||
|---|---|---|---|
|
||||
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||
|Description|Provide a brief description about the journal entry.| | |
|
||||
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||
|
||||
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
||||
| | | | |
|
||||
|---|---|---|---|
|
||||
|Date: <br><br>Record the date of the journal entry.|Entry:<br><br>Record the journal entry number.| | |
|
||||
|Description|Provide a brief description about the journal entry.| | |
|
||||
|Tool(s) used|List any cybersecurity tools that were used.| | |
|
||||
|The 5 W's|Capture the 5 W's of an incident.<br><br>- Who caused the incident?<br> <br>- What happened?<br> <br>- When did the incident occur?<br> <br>- Where did the incident happen?<br> <br>- Why did the incident happen?| | |
|
||||
|Additional notes|Include any additional thoughts, questions, or findings.| | |
|
||||
|
||||
|
||||
|
||||
### Need another journal entry template?
|
||||
|
||||
If you want to add more journal entries, please copy one of the tables above and paste it into the template to use for future entries.
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
||||
| |
|
||||
|---|
|
||||
|Reflections/Notes: Record additional notes.|
|
|
@ -2,8 +2,6 @@
|
|||
---
|
||||
|
||||
|
||||
|
||||
|
||||
| | |
|
||||
| ------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
|
||||
| **Stages** | **Sneaker company** |
|
||||
|
|
Loading…
Reference in a new issue