Creating a Honeypot Windows 10 Virtual Machine and Analyzing the logs using Microsoft Sentinel
Tags
attack-pattern: | Data Credentials - T1589.001 Password Spraying - T1110.003 Tool - T1588.002 Brute Force - T1110 |
Common Information
Type | Value |
---|---|
UUID | 920da6b1-ba6e-4fbb-941a-6651dd8f913b |
Fingerprint | f2981e0b2dafe682 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | June 16, 2023, 7:48 p.m. |
Added to db | June 16, 2023, 10 p.m. |
Last updated | Nov. 7, 2024, 10:45 p.m. |
Headline | Creating a Honeypot Windows 10 Virtual Machine and Analyzing the logs using Microsoft Sentinel |
Title | Creating a Honeypot Windows 10 Virtual Machine and Analyzing the logs using Microsoft Sentinel |
Detected Hints/Tags/Attributes | 31/1/2 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |