Acheivement Demo 7
Acheivement Demo 7
Saleamlak Msgan
• ISO auditing
• Event logging and incident management
• Capacity monitoring
• Management and technical vulnerability
why • Asset inventory and ownership
• Risk management and assessments
DEMO AREAS
DEMO OBJECTIVE
Wazuh and
AD/GPO Pen testing Functionality test
related
➢Topology ➢Manage ➢Reconnaissance ➢BitLocker
➢Threat and user and ➢AD functionality
vulnerability account Enumeration test
detection ➢Create GPO ➢OSINT ➢BitLocker
➢Tools I created performance
➢Custom rules, impact test
command, and ➢Window 11
configurations upgrade test
➢Python and report
integration
scripts
➢Compliance
DEMO OBJECTIVE
➢ I begin by understanding
and documenting the wazuh
architecture
➢ This helped identify where to
play around.
Report
Wazuh and Related …
Custom rules, Python
Threat and
Topology Tools I created command, and integration compliance
vulnerability
configuration script
➢ Asset management
➢ Capacity monitoring
➢ Patches Tracking
LIVE DEMO
Wazuh and Related …
Custom rules, Python
Threat and
Topology Tools I created command, and integration compliance
vulnerability
configuration script
LIVE DEMO
Wazuh and Related …
Custom rules, Python Python
Threat and
Topology Tools I created command, and integration integration
vulnerability
AD/GPO configuration script scripts
LIVE DEMO
Wazuh and Related …
Custom rules,
Threat and
Topology Tools I created command, and compliance compliance
vulnerability
configuration
CIS Benchmarks
• Set of best-practice security
configurations for system like window,
Linux, and others
• Provides detailed recommendations on
how to harden systems against threats
• ISO 27001 – A.12.1.1 Operating
Procedures should be documented
• CM-6(Establish and enforce secure
configuration)
• CM-7(Disable unnecessary services and
functions)
• CM-2(maintain a secure baseline for all
system)
AD/GPO
Pen testing
➢ User account management
➢ Wazuh Agent deployment GPO
➢ Wazuh Configuration Sync GPO
Pen
Pentesting
testing
Reconnaissance
Pen testing
AD ENUMERATION
EMAIL THREAT ANALYSIS
CISCO TALOS
WHOIS
URLSCAN.IO
DOMAIN SHADOWING
HOW DO THEY GET THE EMAILS
OSINT – DEHASHED.COM
MMCYTECH.COM OSINT
THEHARVESTER
FUNCTIONALITY TESTING,
REPORTING
DOCUMENTATION