đŸŠč
CYBERSECURITY BOOK
  • đŸ‘œCS && PEN-TESTING BOOK
    • 🔍Reconnaissance
      • 🈮Passive Recon
        • M365/Azure Tenant Recon
          • MSFTRecon
        • đŸ•”ïžOSINT
          • Data Breach and Leaks Resources
          • OSINT Tools and Resources
          • Shodan
          • Creepy
          • The US Army manual ATP 2-22.9
          • NATO OSINT manual
          • Twitter Geolocation
          • Geotagging: GeoSocial Footprint
          • Bitcoin Address Lookup
          • Google Docs OSINT
          • Monitoring Tools
          • TOR Onion Links
          • Phone Numbers
          • Mitaka - In-Browser Tool
          • Russian Target
          • FTP Servers
          • War Related
        • đŸŽŸïžADINT
          • Surveillance
        • đŸ—șGEOINT
          • Methodology
          • SunCalc - Geospatial OSINT using shadows
        • â˜ąïžSIGINT
          • Methodology
          • Wifi
            • Kismet
        • ⛓DNS Recon and Route Mapping
        • đŸ‘šâ€đŸ’ŒObtain User Information
        • đŸ•žïžWeb Recon
        • đŸ•·ïžScraping Crypto Addresses
        • File Sharing Services
      • â˜ąïžActive Recon
        • đŸčStealth Scanning Strategies
        • 🏭Identify Network Infrastructure
        • đŸ’»Host Enumeration
        • ⛷Sparta
        • đŸ§©Fuzzing
          • ❄Wfuzz
          • Fuzzing Applications
          • Linux Kernel Fuzzing
          • Fuzzing Chrome V8 Engine
      • ☊Doxing
        • Doxing Anyone
        • Gmail Address
      • đŸŽ„Surveillance
        • Location Tracking Techniques
    • 🔱Enumeration
      • 🔅Protocols and Ports
        • 21 - FTP
        • 22 - SSH
        • 23 - Telnet
        • 25, 465 - SMTP
        • 110, 143 - POP3, IMAP4
        • 1521 - Oracle DB Server
        • 3306 - Mysql
        • 2375 - Docker
        • 8080, 50000 - Jenkins
        • 80, 443 - HTTP, HTTPS
        • 3389 - RDP
        • 5900 - VNC
        • 445 - SMB
        • 161 UDP - SNMP
        • 11211 - Memcached
        • 2049 - NFS
      • 🐧Linux - POST
      • đŸȘŸWindows - POST
      • đŸ•žïžWeb Apps
        • Directory Enumeration
        • Identify Virtual Websites
    • â˜źïžPublic Exploits
      • Look for Public Exploits
      • Metasploit
    • 🕎Vulnerability Scanning
      • ⚛Nuclei
      • â›”Tsunami Security Scanner
      • Hunting and Exploiting Vulnerable Windows Drivers
    • đŸ•łïžTunneling & Exfiltration
      • SSH Tunneling
      • ICMP Exfiltration
      • DNS Exfiltration
      • DNS Tunneling
      • TCP/UDP Tunneling
      • CloudFlare Tunnel
      • SOCKS
      • Ngrok - Port Forwarding
      • CURL - Exfiltration
      • Rclone - Data Exfiltration
      • Data Bouncing - External Data Exfiltration
    • Backdoors
      • Asymmetric Backdoor
    • 🎣Pivoting (Post Exploitation)
      • Using Metasploit
      • SOCKS, SSH - Pivoting
      • Remote Port Forwarding
      • Tool - Chisel
      • Chisel - Double Pivoting
      • Bypassing Firewall with Forward Relays
      • Reverse Relays - Metasploit
      • Pivoting using Ligolo-Ng
    • 🎯Active Directory Pentesting
      • 🔑Crendentials
        • Group Policy Preferences
        • LLMNR Poisoning
        • LDAP (Post)
        • Brute Force
        • LAPS Toolkit
        • PFX File
      • 🐕‍đŸŠșKerberos Attacks
        • ASREProast
        • Kerberoast
        • Pass the Certificate
      • 🏁AD Post Exploitation
        • Active Directory Post Exploitation
      • â„čIntroduction to Identities
      • 🔧Testing Active Directory
      • 🎓Advanced Penetration Testing
      • 🔧Automated Tools
        • ADCS Exploitation Tool
        • BadSuccessor – Full Active Directory Compromise
      • Hacking Active Directory Environment
        • đŸ•”ïžEnumeration
        • 🩾Exploitation
        • đŸšȘPrivilege Escalation
      • Windows and Active Directory Attacks
        • Shared Local Administrator Password
        • NTLM/SMB Relay
    • 🐳Docker
      • Docker Container
      • Expose Docker Remotely
    • ☞Kubernetes
      • Basic Commands
    • đŸ™…â€â™‚ïžSocial Engineering
      • đŸ—șLocation Phishing
      • đŸ§˜â€â™‚ïž0-Click Email Attack
      • 🐧Binary Linux Trojan
      • 📧Phishing Mail
      • 📁Malicious File
      • ♉Malicious USB Drive
      • đŸ“©Spear-Phishing Methods (VIP)
      • đŸ§‘â€đŸ’ŒInsider Attack
      • Wifi Phishing - Wifiphisher
      • 🔐MFA Bypass
      • Link Attacks
      • 📋Clipboard Hijacking (Post)
      • Copy-Paste Spoofing
    • đŸ—șCEH Mindmaps
      • â„čRecon and Information Gathering
        • Lab 1: Perform Footprinting Through Search Engines
          • Task 1: Gather Information using Advanced Google Hacking Techniques
          • Task 2: Gather Information from Video Search Engines
          • Task 3: Gather Information from FTP Search Engines
          • Task 4: Gather Information from IoT Search Engines
        • Lab 2: Perform Footprinting Through Web Services
          • Task 1: Find the Company's Domains and Sub-domains using Netcraft
          • Task 2: Gather Personal Information using PeekYou Online People Search Service
          • Task 3: Gather an Email List using theHarvester
          • Task 4: Gather Information using Deep and Dark Web Searching
          • Task 5: Determine Target OS Through Passive Footprinting
        • Lab 3: Perform Footprinting Through Social Networking Sites
          • Task 1: Gather Employee's Information from LinkedIn using theHarvester
          • Task 2: Gather Personal Information from Various Social Networking Sites using Sherlock
          • Task3: Gather Information using Followerwonk
        • Lab 4: Perform Website Footprinting
          • Task 1: Gather Information About a Target Website using Ping Command Line Utility
          • Task 2: Gather Information About a Target Website using Photon
          • Task 3: Gather Information About a Target Website using Central Ops
          • Task 4: Extract a Company's Data using Web Data Extractor
          • Task 5: Mirror a Target Website using HTTrack Web Site Copier
          • Task 6: Gather Information About a Target Website using GRecon
          • Task 7: Gather a Wordlist from the Target Website using CeWL
        • Lab 5: Perform Email Footprinting
          • Task 1: Gather Information about a Target by Tracing Emails using eMailTrackerPro
        • Lab 6: Perform Whois Footprinting
          • Task 1: Perform Whois Lookup using DomainTools
        • Lab 7: Perform DNS Footprinting
          • Task 1: Gather DNS Information using nslookup Command Line Utility and Online
          • Task 2: Perform Reverse DNS Lookup using Reverse IP Domain Check and DNSRecon
          • Task 3: Gather Information of Subdomain and DNS Records using SecurityTrails
        • Lab 8: Perform Network Footprinting
          • Task 1: Locate Network Range
          • Task 2: Perform Network Tracerouting in Windows and Linux Machines
          • Task 3: Perform Advanced Network Route Tracing Using Path Analyzer Pro
        • Lab 9: Perform Footprinting using Various Footprinting Tools
          • Task 1: Footprinting a Target using Recon-ng
          • Task 2: Footprinting a Target using Maltego
          • Task 3: Footprinting a Target using OSRFramework
          • Task 4: Footprinting a Target using FOCA
          • Task 5: Footprinting a Target using BillCipher
          • Task 6: Footprint a Target using OSNIT Framework
      • 🔄Network Scanning
        • Tasks
      • 🔱Enumeration
        • Tasks
      • 👹‍🔧Vulnerability Analysis
        • Tasks
      • 🩾System Hacking
        • Tasks
      • *Malware Analysis
        • Tasks
      • ❄Sniffing
        • Tasks
      • đŸ§‘â€đŸ€â€đŸ§‘Social Engineering
        • Tasks
      • đŸš«Denial of Service
        • Tasks
      • đŸ›©ïžSession Hijacking
        • Tasks
      • 🆔Evading IDS, Firewalls, and Honeypots
        • Tasks
      • đŸ–„ïžWeb Server Hacking
        • Tasks
      • đŸ•žïžWeb Application Hacking
        • Tasks
      • 💉SQL Injection
        • Tasks
      • đŸ‘ïžâ€đŸ—šïžWireless Network Hacking
        • Tasks
      • đŸ“±Mobile Hacking
        • Tasks
      • 👹‍🔬IoT and OT Hacking
        • Tasks
      • ☁Cloud Computing
        • Tasks
      • 🔏Cryptography
        • Tasks
    • đŸ—ŸCND Mindmaps
    • 👿Vulnerability Research
      • đŸ‘šâ€đŸ’»Code Review
    • đŸ“¶Network Security
      • 🩝Installing and Configuring Network Based IDS In Ubuntu: Suricata
      • đŸ›ïžOpenSSL
      • đŸ‘©â€đŸš’Active Directory
        • LAPS
    • 🛂Port Forwarding
      • 🐧Linux
      • đŸȘŸWindows
      • 🔄Router
    • đŸ‘ŸAPI Testing
      • Reverse Engineering
        • Reverse Engineer an API using MITMWEB and POSTMAN
      • API Hacking Basics
        • Practicals
      • đŸ•”ïžâ€â™‚ïžAPI Recon
      • 📄API Documentation
        • ⚗Lab: Exploiting an API endpoint using documentation
      • đŸ‘šâ€đŸŽ€Identifying and Interacting with API Endpoint
        • ⚗Lab: Finding and exploiting an unused API endpoint
      • 🩼Finding Hidden Parameters
      • đŸ·Mass assignment vulnerabilities
        • ⚗Lab: Exploiting a mass assignment vulnerability
      • ✅Preventing vulnerabilities in APIs
      • đŸ˜·Server-side parameter pollution
      • đŸ•”ïžâ€â™‚ïžTesting for server-side parameter pollution in the query string
        • ⚗Lab: Exploiting server-side parameter pollution in a query string
      • đŸ›ŁïžTesting for server-side parameter pollution in REST paths
      • 🚧Testing for server-side parameter pollution in structured data formats
        • ⚗Lab: Exploiting server-side parameter pollution in a REST URL
      • 👹‍🚀Testing with automated tools
      • 🚹Preventing server-side parameter pollution
    • đŸ•žïžWeb App Pentesting Notes
      • 🧰Web App Pentesting Tools
        • Fuzzing: ffuf Tool
        • Nosql Injection: NoSqlMap
        • Kiterunner
        • Burp Suite
      • ❌XSS and XSRF Together
      • 💉NoSQL Injection
        • NoSQL Databases
        • NoSQL syntax injection
        • NoSQL operator injection
        • Exploit Syntax Injection to Extract Data
        • Exploiting NoSQL operator injection to extract data
        • Timing based injection
        • Preventing NoSQL injection
      • 🧙Cross Site Request Forgery
      • đŸ“ŒHidden Parameter Discovery
      • 📌SSTI : Server Side Template Injection
        • Lab: Basic server-side template injection
        • Lab: Basic server-side template injection (code context)
        • Lab: Server-side template injection using documentation
        • Lab: Server-side template injection in an unknown language with a documented exploit
        • Lab: Server-side template injection with information disclosure via user-supplied objects
      • 💎JWT Attack
        • Exploiting flawed JWT signature verification
        • Brute-forcing secret keys
        • JWT header parameter injections
        • Prevent JWT attacks
      • 📊GraphQL API Vulnerabilities
        • Exploiting Unsanitized Arguments
        • Discovering Schema Information
          • Lab: Accessing private GraphQL posts
          • Lab: Accidental exposure of private GraphQL fields
        • Bypassing GraphQL introspection defenses
          • Lab: Finding a hidden GraphQL endpoint
        • Bypassing rate limiting using aliases
          • Lab: Bypassing GraphQL brute force protections
        • GraphQL CSRF
          • Lab: Performing CSRF exploits over GraphQL
      • 🔏Authentication Vulnerabilities
      • 🏇Race Conditions
        • Limit overrun race conditions
        • Multi Endpoint Race Conditions
        • Single Endpoint Race Conditions
        • Time Sensitive Attacks
      • 🧠LLM Attacks
        • Exploiting LLM APIs, functions, and plugins
        • Indirect Prompt Injection
      • ☞Host Header Attacks
        • Testing for Vulnerability
        • Password Reset Poisoning
        • Web Cache Poisoning
        • Accessing Restricted Functionality
    • đŸ›©ïžWireless Hacking
      • Zigbee Attacks
      • Wifi Attacks
        • Hack WPA2 Networks
        • Automated: Wifite
      • Bluetooth Attacks
        • BlueDucky Script
      • RFID Attacks
    • 🏁CEH Engage Walkthroughs
      • 1ïžâƒŁCEH Engage Part 1
      • 2ïžâƒŁCEH Engage Part 2
      • 3ïžâƒŁCEH Engage Part 3
      • 4ïžâƒŁCEH Engage Part 4
    • 🎃Evasion
      • OWASP-ZSC
      • AMSI Bypass
      • Windows Evasion
      • Windows Defender Application Control (WDAC): Killing EDR
      • InvisibilityCloak - C# Obfuscation Toolkit
    • đŸšȘPost exploitation
      • 🛬Living Off The Land Tools
      • đŸ„Mimikatz
      • 🐧Privilege escalation: Linux
      • đŸȘŸPrivilege escalation: Windows
      • đŸ‘ŸPAC Tempering
      • Amnesiac - EDR Bypass
      • GraphRunner: A Post-Exploitation Toolset for Microsoft 365
    • 🔓Hashing & Password Cracking
      • Hashing
      • Custom Wordlist
      • Hydra
      • John
      • Windows - Local Password Cracking
      • Password Cracking using Rules
    • 📒Hacking Cheat Sheets
      • 🔍Recon Cheatsheet
      • 🔱Enumeration Cheatsheet
      • 🐚Shells and Reverse Shells Cheat Sheet
      • 🐼Meterpreter Cheat Sheet
      • ☄Powershell Commands Cheat Sheet
      • 💉Command Injection Cheat Sheet
      • đŸȘĄSQL Injection Cheat Sheet
      • 🐼Metasploit Cheat Sheet
      • 🧰Ethical Hacking Tools
      • 🐧Linux Hacking Basics
      • đŸ”șMSFVenom
    • 🏇CEH Practical
      • CEH Practical Tools
      • 🔍Network Scanning
      • 🐕‍đŸŠșService Enumeration
      • đŸ–ŠïžStegnography
      • 🔓Cryptography
      • đŸ•žïžWeb and Android Hacking
      • đŸšȘPrivilege Escalation
      • 🩄Malware Threats
    • ☁Cloud Pentesting
      • ✏AWS Pentesting
        • 🌆AWS Environments
          • Identity and Access Management
          • Identity Based Policies
          • Resource Based Policy
          • Untitled
        • 🧰Tools
          • AWS CLI
          • Pacu
          • Prowler
          • Cloudsplaining
        • Attacks & Methodology
          • 👹‍🔬Exploiting AWS Misconfigurations
          • AWS Pentest Methodology
        • Initial Access
          • Public Access
          • Leaked Secrets
          • Phishing
          • Resource Exploitation
        • Post-Compromise Recon
          • AWS Command Line
          • Resource Enumeration
          • IAM Policy Enumeration
          • Identifying Public Resources
        • S3 Buckets
          • S3 Bucket Misconfiguration
      • đŸ…°ïžAzure Pentesting
        • Azure Attack Matrix
        • Stealing Access Tokens
        • Lateral Movement - Skeleton Key Attack
    • đŸȘŸWindows Security
      • đŸ•”ïžâ€â™‚ïžRecon
        • Host Discovery
        • SMB
        • MSSQL
        • IIS
      • đŸŠčExploitation
        • CMD Commands
      • đŸšȘPost Exploitation
        • Dump Password Hashes
        • Mimikatz
      • 🩕Persistence (Post)
        • User Accounts, Hash Cracking, RID Hijacking
        • Backdoors
        • Services
        • Scheduled Tasks
        • Windows Startup
    • 🐧Linux Security
      • đŸ‹ïžâ€â™‚ïžPrivilege Escalation
        • 1ïžâƒŁ1⃣ 1⃣ Exploiting Setuid Programs
        • 2ïžâƒŁ2⃣ 2⃣ Cron Jobs
        • 3ïžâƒŁ3⃣ 3⃣ Permissions
        • 4ïžâƒŁ4⃣ 4⃣ Logs
        • 5ïžâƒŁ5⃣ 5⃣ Restricted Shell
      • Persistence
        • D3m0n1z3dShell
    • 🍎MacOS Security
      • Endpoint Security
        • eslogger
      • Gaining Access
        • Setup and weaponize Mythic C2 using DarwinOps to target MacOS
    • đŸ“±Android Security
      • Android Pentesting Notes
      • Android Application Pentesting Part 1
        • Static Analysis
        • Dynamic Analysis
      • Android Application Pentesting Part 2
        • Aspects of Android Security
        • Static Application Testing
        • Dynamic Application Testing - Part 1
        • Platform Interaction Testing
        • Dynamic Application Testing - Part 2
        • OWASP Top 10
      • Mobile Application Pentesting Part 3
        • Mobile Security Controls
        • Dynamic Analysis
        • Static Code Analysis
        • Insecure Data Storage
        • Runtime Security
    • 🍎iOS Security
      • iOS Application Analysis
    • đŸ§ŸScripting
      • 💎Ruby
        • Basics
        • Object Types
      • 🐍Python
        • Web Scrapping Scripts
      • 🐧Bash
      • đŸȘPerl
      • 🐘PHP
    • 🐉Reverse Engineering & Malware Analysis
      • RE Preparation
        • RE Process
        • Malware Analysis Tools
        • Malware Components: Windows
      • Shellcode Analysis
        • Automated Extraction
      • 1ïžâƒŁDisassembly and Disassembler
      • 2ïžâƒŁBinary Analysis
      • 🐧Linux ELF Format
      • ♎Yara Guide
      • đŸ“±Android Reverse Engineering
        • Spyware Reverse Engineering
      • đŸ“ČMobile Applications
        • Flutter Mobile Apps
    • 🌠Protocol Exploitation
      • ARP
      • DNS
      • VoIP
    • 🛜Network Pentesting
      • SNMP - Authentification
    • 👼Digital Forensics & Incident Response
      • đŸ“©Email Forensics
        • Callback Phishing
        • Business Email Compromise Investigations
          • Investigating using Hawk
          • Microsoft Defender Explorer
      • 💾Ransomware Forensics
        • Decrypting Intermittent Encryption
      • đŸ’±Blockchain Forensics
        • đŸŸFrontrunning/Sandwich Bot Finder
      • 📝Memory Forensics
        • Process
        • Memory Analysis - Volatility3
      • ☄Network Forensics
        • Pcap Analysis
      • đŸȘŸWindows Forensics
        • NTDS Secret Extraction
        • Detecting Hidden Processes
        • Analyzing Prefetch Files
        • Windows MFT Parsing
        • USN Journal Forensics
      • đŸ“ŒMedia Forensics
        • Rubber Ducky Analysis
        • RDP Bitmap Cache
        • USB Event Tracking
      • 🧙Forensic Imaging
        • Image Analysis: Autopsy
      • đŸȘ…Data Collection
        • đŸȘŸWindows
        • 🐧Unix/Linux
      • 🔏Privacy Research
        • Deanonymization - TOR Hidden Services
        • Deanonymization - Flash Code
        • Dark Web - OSINT
        • Dark Web Investigation
      • đŸ•žïžWeb Investigations
        • Investigating Favicon Hashes
      • đŸŽâ€â˜ ïžThreat Detection
        • Reading Clipboard Data via Powershell
        • Detection of Windows Defender Tampering via Powershell
        • Detection of Remote Template Injection
    • 🩋Cisco Attacks
      • Decrypting Type 5 Cisco Passwords
    • đŸŒCVE's
      • libssh 0.8.1 - CVE 2018-10933
      • proftpd-1.3.3c-backdoor
      • zerologon - CVE-2020-1472
      • Apache Ghostcat - CVE 2020-1938
      • Spring Authorization Bypass - CVE 2024-38821
      • Apache Solr - CVE-2024-45216
      • Bypassing Mark of the Web with 7zip CVE-2025-0411
      • CVE-2025-24054, NTLM Exploit in the Wild
    • 🐛OWASP TOP 10
      • LLM
        • OWASP Top 10 for LLM Applications
      • Machine Learning
        • OWASP Machine Learning Security Top Ten
      • đŸ•žïžWEB
        • 1ïžâƒŁA01:2021 – Broken Access Control
        • 2ïžâƒŁA02:2021 – Cryptographic Failures
        • 3ïžâƒŁA03:2021 – Injection
        • 4ïžâƒŁA04:2021 – Insecure Design
        • 5ïžâƒŁA05:2021 – Security Misconfiguration
        • 6ïžâƒŁA06:2021 – Vulnerable and Outdated Components
        • 7ïžâƒŁA07:2021 – Identification and Authentication Failures
        • 8ïžâƒŁA08:2021 – Software and Data Integrity Failures
        • 9ïžâƒŁA09:2021 – Security Logging and Monitoring Failures
        • 🔟A10:2021 – Server-Side Request Forgery (SSRF)
      • 🩄API
      • 🌆IoT
      • đŸ“±MOBILE
    • đŸ›ŒWeb 3 Vulnerabilities
      • Fuzzing Ethereum Smart Contract
      • Static Analysis using Slither
      • Solidity Audit using Mythril
      • 🎆Reentrancy Vulnerabilities
      • đŸ„ȘSandwich Attacks
      • 🌇Integer Attacks
      • 🚂Authorization Issues
      • 🌉Bad Randomness
    • đŸ›©ïžWeb 3 Smart Contract
      • ⛎Blockchain Hacking (Python)
        • 🌆Smart Contract Template
        • 🎆Interact with ERC20 Tokens
        • đŸ“ČInteract with Wallets
        • đŸ·Reverse Engineering Bytecode
        • ✒Sign Transactions
        • đŸȘąSmart Contract Interactions
        • đŸ§œâ€â™€ïžSubscribing to Events
        • đŸŸ€Brownie Interactions
        • đŸ‘ŸExploit PoC
    • 🌃Smart Contract Audits
      • 🐾Thunder Loan Audit
        • 1ïžâƒŁInitial Review
    • đŸ‘©â€đŸ’ŒGRC Frameworks
      • NIST 800-39
      • SOC 2
      • HIPAA
      • PCI-DSS
      • NIST CSF
      • FedRAMP
      • CSA STAR
      • SOX
      • GDPR
      • ISO 27001
  • đŸŠčREAL WORLD && CTF
    • ⚛Scripts and Systems
      • R: Code Execution
      • Python2 Input Vulnerability
  • 🩾MISCELLANEOUS
    • Decrypt SSL Traffic
    • 🏩OpenSSL Commands
    • 🔒GPG
    • 🔐SSH Commands
    • OWASP BWAPP Setup
    • Commando VM Setup
    • Living Off The Land Applications
    • 🐧Develop Your Own Linux Distro
    • đŸ±GitHub Commands
      • 📔Cheatsheet
  • đŸ§›â€â™‚ïžADVANCED PERSISTENT THREATS - RESEARCH
    • Reconnaissance
    • Resource Development
    • Initial Compromise
    • Execution
    • Establish persistence
    • Escalate privileges
    • Defense Evasion
    • Credential Access
    • Discovery
    • Lateral movement
    • Collection
    • Command and Control
    • Data exfiltration
    • Impact
  • đŸ‘ŸTHREAT HUNTING - RESEARCH
    • MacOS
    • Azure Sentinel
    • Network Data
      • Network Data Sources
      • Network Threat Hunting Too
      • Hunting the Undetected
      • Protocols
      • Network Threat Hunts
    • Active Directory
      • Introduction
      • Threat Hunting
      • Threat Hunting in Active Directory
    • Data Collection
      • Internal Data
      • External Data
        • Private Data Sources
        • Community Data Sources
        • Public Data Sources
      • OSINT
    • Data Management and Processing
      • Data Processing
      • Common CTI Standards
      • Storage and Integration
      • Threat Intelligence Platforms
    • Analysis
      • Introduction
      • Analysis of Competing Hypothesis
      • Cyber Kill Chain and Diamond Model
      • Cyber Kill Chain and Courses of Action
    • Campaign Analysis
      • Introduction
      • Heatmap Analysis
      • Visual Analysis
      • MITRE Threat Group Tracker
      • Threat Intelligence Naming Conventions
    • Attribution
      • Introduction
      • Cognitive Biases
      • Logical Fallacies
      • Manage Biases
      • Nation-State Attribution
    • Dissemination and Sharing
      • Introduction
      • Tactical Intelligence
      • Operational Intelligence
      • Strategic Intelligence
  • 🩅CISA - INCIDENT RESPONSE PLAYBOOK
    • Overview
Powered by GitBook
On this page
  • Introduction
  • Core Capabilities
  • Investigation Types
  • Understanding Output
  • 1. Preparation and Initial Setup
  • 2. Conduct a Tenant-Wide Investigation
  • 3. Perform a User-Specific Investigation
  • 4. Analyze Collected Data
  • 5. Implement Remediation Measures
  • REFERENCES

Was this helpful?

Edit on GitHub
  1. CS && PEN-TESTING BOOK
  2. Digital Forensics & Incident Response
  3. Email Forensics
  4. Business Email Compromise Investigations

Investigating using Hawk

Introduction

Hawk is a free, open-source PowerShell module that streamlines the collection of forensic data from Microsoft cloud environments. Designed primarily for security professionals, incident responders, and administrators, Hawk automates the gathering of critical log data across Microsoft services, with a focus on Microsoft 365 (M365) and Microsoft Entra ID.

Core Capabilities

  • Data Collection: Efficiently gather forensic data with automated collection processes

  • Security Analysis: Examine security configurations, audit logs, and user activities

  • Export & Report: Generate both CSV reports and JSON data for SIEM integration

What Hawk is and isn't

While Hawk includes basic analysis capabilities to flag potential items of interest (such as suspicious mail forwarding rules, over-privileged applications, or risky user activities), it is fundamentally a data collection tool rather than an automated threat detection system.

Hawk streamlines data collection compared to manually running individual queries through web interfaces, freeing up those resources for other administrative tasks. The tool's goal is to quickly get you the data needed to come to a conclusion; not to make the conclusion for you.

Investigation Types

Hawk offers two main investigation approaches:

Tenant Investigations

  • Examines broader Microsoft Cloud tenant settings, audit logs, and security configurations

  • Provides an excellent starting point for identifying suspicious patterns

  • Use Start-HawkTenantInvestigation to begin a tenant-wide investigation

User Investigations

  • Performs deep-dive analysis into individual user accounts

  • Examines mailbox configurations, inbox rules, and login histories

  • Use Start-HawkUserInvestigation -UserPrincipleName <user@domain.com> to investigate specific users

Understanding Output

Hawk organizes investigation results into a structured directory hierarchy:

📂 [Investigation Root]
├── 📂 Tenant/
│   ├── AdminAuditLogConfig.csv
│   ├── OrgConfig.csv
│   ├── _Investigate_*.csv
│   └── [other tenant files]
├── 📂 [user1@domain.com]/
│   ├── Mailbox_Info.csv
│   ├── InboxRules.csv
│   ├── _Investigate_*.csv
│   └── [other user files]
└── 📂 [user2@domain.com]/
    └── [similar structure]

Files prefixed with _Investigate_ contain potentially suspicious findings that warrant further review.

System Requirements

  • Windows operating system with administrator access

  • PowerShell 5.0 or above (PowerShell Core will be supported in future)

  • Network connectivity to:

    • PowerShell Gallery

    • Graph API

    • Microsoft 365 services


1. Preparation and Initial Setup

A. Gather Necessary Permissions

Ensure you have appropriate administrative permissions in the Microsoft 365 environment. This typically includes Global Administrator rights or, at a minimum, roles that allow you to access audit logs, mailbox settings, and security configurations.​

B. Install the Hawk PowerShell Module

Install Hawk by launching PowerShell with administrative privileges and executing:​

Install-Module -Name Hawk

c. Set Up an Output Directory

New-Item -Path "C:\Temp\Hawk" -ItemType Directory

2. Conduct a Tenant-Wide Investigation

A. Connect to Necessary Services

Connect-ExchangeOnline
Connect-MsolService

B. Initiate the Tenant Investigation

Start-HawkTenantInvestigation -OutputDirectory "C:\Temp\Hawk" -Days 30

3. Perform a User-Specific Investigation

A. Identify Compromised Accounts

Review the tenant investigation results to pinpoint accounts exhibiting suspicious activity.​

B. Investigate Specific User Accounts

For each suspected account, run:​

Start-HawkUserInvestigation -UserPrincipalName "user@example.com" -OutputDirectory "C:\Temp\Hawk" -Days 30

4. Analyze Collected Data

A. Review Sign-In Logs

Examine the sign-in logs for anomalies such as logins from unfamiliar locations or devices.​

B. Inspect Inbox Rules and Forwarding Settings

Check for unauthorized inbox rules or forwarding settings that could indicate malicious activity.​

C. Assess Mailbox Permissions

Verify that mailbox permissions have not been altered to grant unauthorized access.​


5. Implement Remediation Measures

A. Reset Compromised Credentials

Force password resets and revoke existing sessions for affected accounts.​

B. Remove Malicious Configurations

Delete any unauthorized inbox rules, forwarding settings, or application consents identified during the investigation.​

C. Enhance Security Posture

Implement measures such as enabling multi-factor authentication (MFA), disabling legacy protocols, and conducting security awareness training to prevent future incidents.


REFERENCES

PreviousBusiness Email Compromise InvestigationsNextMicrosoft Defender Explorer

Last updated 2 months ago

Was this helpful?

If prompted about installing from an untrusted repository, confirm by typing 'Y' and pressing Enter. ​

Create a dedicated directory to store the data extracts from Hawk:​

Establish connections to Exchange Online and the Microsoft Online Service (MSOL):​

Execute the tenant investigation to collect broad data across the organization:​

This command collects logs and configurations from the past 30 days. ​

Replace "" with the actual User Principal Name (UPN) of the account under investigation. ​

đŸ‘œ
👼
đŸ“©
Practical 365
Practical 365
Practical 365
Practical 365+1Hawk Forensics+1
Practical 365
user@example.com
https://github.com/T0pCyber/hawk