Open in app

Sign In

Write

Sign In

Cyb3rt
Cyb3rt

116 Followers

Home

About

Feb 2

Using a Yubikey As Multi-Factor Authentication for MacOS

February 2nd is World 2FA day so I thought it would be fun to write a short guide about how to add a Yubikey Security Key as a second factor (2FA) to sign-in to your MacBook. This guide is intended for unmanaged devices. Devices managed in Active Directory by a…

Cybersecurity

5 min read

Using a Yubikey As Multi-Factor Authentication for MacOS
Using a Yubikey As Multi-Factor Authentication for MacOS
Cybersecurity

5 min read


Aug 3, 2022

How To Detect Remote Desktop Protocol tunneling over SSH

During some testing on my Windows VPS, I was checking out the OpenSSH server feature in Windows. This reminded me about the times our Red Team tunneled Remote Desktop Protocol (RDP) network traffic through an encrypted Secure Shell (SSH)-session, when pivoting in our customer’s network. Hiding your RDP traffic in…

Cybersecurity

10 min read

How To Detect Remote Desktop Protocol tunneling over SSH
How To Detect Remote Desktop Protocol tunneling over SSH
Cybersecurity

10 min read


Jul 14, 2022

How Purple Teaming Made Me A Better Blue Teamer

The Fun Uncle So, sit down and have a drink of your choice, because it’s story time with Uncle Bert. The fun uncle, not the weird one from birthdays. Or at least I hope. I’ve been a Blue Teamer for almost 15 years in various government positions; for example SOC analist, forensics and…

Red Team

6 min read

How Purple Teaming Made Me A Better Blue Teamer
How Purple Teaming Made Me A Better Blue Teamer
Red Team

6 min read


Oct 19, 2021

Threat Hunting Toolset and Operational Security Considerations

In my last blog, I wrote how to detect fileless malware, but out-of-scope was how to hunt if you have an indication that someone is poking around in your network. …

Threat Hunting

8 min read

Threat Hunting Toolset and Operational Security Considerations
Threat Hunting Toolset and Operational Security Considerations
Threat Hunting

8 min read


Jul 1, 2021

Dealing With Advanced Windows Defender Bypass Attempts

Table of Contents Introduction Detecting the Command and Control Traffic (C2) Endpoint Detection and Prevention Securing Powershell Threat Hunting Bonus Conclusion Introduction Some of you might have read the tutorials from my dear colleague Crypt0jan on how to bypass Windows Defender. That’s all fine and dandy but we’re a Purple Team and my job…

Cybersecurity

7 min read

Dealing With Advanced Windows Defender Bypass Attempts
Dealing With Advanced Windows Defender Bypass Attempts
Cybersecurity

7 min read


Jun 22, 2021

Analysing A Security Alert 101

People often ask me how I analyse a Securiy Alert or incident. There really is no set way and much has to do with experience, the tools at hand and the maturity of your SOC. However there are some steps that in my opinion always work. This is by no…

Blue Team

6 min read

Analysing A Security Alert 101
Analysing A Security Alert 101
Blue Team

6 min read


Jun 3, 2021

An Introduction To Security Monitoring With Open Source Software

An Introduction To Security Monitoring With Open Source Software Why another post about security monitoring? Having worked (and build) in Security Operations Centers (SOC) for many years and having observed many organizations during Chapter8’s Purple Team missions, in my experience many companies still view security monitoring as something magical and believe you need a SOC to perform this task…

Soc

6 min read

An Introduction To Security Monitoring With Open Source Software
An Introduction To Security Monitoring With Open Source Software
Soc

6 min read

Cyb3rt

Cyb3rt

116 Followers

Founder// Hunter @ Chapter8.com

Following
  • Barack Obama

    Barack Obama

  • Chapter8

    Chapter8

  • Thales Group

    Thales Group

  • Pepijn Vissers

    Pepijn Vissers

  • Pratinav Chandra

    Pratinav Chandra

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech