Unarmed Warriors (@unarmedwarriors) 's Twitter Profile
Unarmed Warriors

@unarmedwarriors

Cyber | Data | AI

ID: 1716609071598501889

linkhttp://Uwarriors.co calendar_today24-10-2023 00:14:48

133 Tweet

7 Followers

1 Following

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

IPv6 Security: Attacks and Countermeasures in a Nutshell docs.google.com/spreadsheets/d… #IPv6Security #Cybersecurity #NetworkSecurity #ITSecurity #InfoSec #SecurityAwareness #Cyberattacks #Countermeasures #IPv6 #NextGenInternet #Threats #Vulnerabilities #Protection #Mitigation

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

MITM6: A Spooky Threat Lurking in the Shadows of IPv6 docs.google.com/spreadsheets/d… #MITM6 #CybersecurityThreat #IPv6Security #NetworkSecurity #ManInTheMiddle #DigitalRisks #DataBreaches #OnlineSafety #Cyberattacks #Hacking #Spoofing #PrivacyConcerns #NextGenThreats #EmergingThreats

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Mitigating the Risks: A Guide to Hardening Your MFP Security docs.google.com/spreadsheets/d… #MFPSecurity #DataSecurity #Cybersecurity #ITSecurity #HardeningGuide #SecurityBestPractices #RiskMitigation #ProtectingYourData #MFPvulnerabilities #NetworkSecurity #SecurePrinting #RemoteWork

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Early Intervention Saves Lives: The Importance of Effective Initial Attack docs.google.com/spreadsheets/d… #EarlyIntervention #InitialAttack #EffectiveResponse #CriticalResponse #Mitigation #Preparedness #RiskManagement #PublicSafety #EmergencyManagement #CrisisResponse #GoldenHour

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Hunting Down the Intruder: Techniques for Post-Compromise Detection docs.google.com/spreadsheets/d… #IncidentResponse #PostCompromiseDetection #ThreatHunting #DigitalForensics #Cybersecurity #NetworkSecurity #SecurityOperations #SecurityAnalysis #MalwareDetection #EndpointSecurity

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Best Practices for Maintaining a Secure Domain: LDAP Domain Dump docs.google.com/spreadsheets/d… #DomainSecurity #ActiveDirectorySecurity #CybersecurityBestPractices #SecurityAwareness #MultiFactorAuthentication #LeastPrivilege #PatchManagement #IncidentResponse #SecurityMonitoring

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Bloodhound for Red Teams and Penetration Testers docs.google.com/spreadsheets/d… #BloodHound #RedTeam #PenetrationTesting #ActiveDirectory #SecurityAssessment #AttackPathMapping #LateralMovement #PrivilegeEscalation #SecurityVulnerability #EthicalHacking #SecurityAwareness #Defense

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Beyond BloodHound: The Power of PlumHound for Blue and Purple Teams docs.google.com/spreadsheets/d… #PlumHound #ActiveDirectorySecurity #SecurityAnalysis #AttackPathMapping #LateralMovement #SecurityAutomation #SecurityOperations #SecurityCollaboration #BlueTeam #PurpleTeam #Security

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Get 80% of Your AD Security in 20% of the Time with PingCastle docs.google.com/spreadsheets/d… #ActiveDirectorySecurity #SecurityEfficiency #StreamlinedAssessments #ReducedRisk #PingCastle #CybersecurityTools #ADHealthChecks #SecurityPostureManagement #SecurityBestPractices #Threat

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Crack Map Exac Simulating Attacks: Penetration Testing for a More Secure Future docs.google.com/spreadsheets/d… #EthicalHacking #PenetrationTesting #SecurityTesting #AttackSimulation #Cybersecurity #CybersecurityAwareness #ThreatDetection #VulnerabilityManagement #SecurityPosture

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Building a Secure Lab: Mastering Security Tools with Kali Linux docs.google.com/spreadsheets/d… #KaliLinux #SecurityLab #EthicalHacking #SecurityLearning #SecuritySkills #VulnerabilityAssessment #PenetrationTesting #CybersecurityAwareness #ProactiveSecurity #DefenseInDepth #Security

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Mimikatz Tool: Protecting Sensitive Data docs.google.com/spreadsheets/d… #CredentialSecurity #DataProtection #CybersecurityAwareness #CredentialTheft #LateralMovement #PrivilegeEscalation #MultiFactorAuthentication #StrongPasswords #EndpointSecurity #DefenseInDepth #Security

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Securing Group Policy Preferences: Patching, Permissions, and Best Practices docs.google.com/spreadsheets/d… #GPPsecurity #ActiveDirectorySecurity #Cybersecurity #PatchManagement #LeastPrivilege #SecurityBestPractices #MitigatingRisk #ReducedAttackSurface #EnhancedSecurity #Secure

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

NTDS.dit: Guarding User Identities docs.google.com/spreadsheets/d… #ActiveDirectorySecurity #UserSecurity #Cybersecurity #IdentityManagement #AccessManagement #Authentication #ThreatProtection #DataSecurity #SecurityBestPractices #LeastPrivilege #PasswordSecurity #ContinuousMonitoring

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

The Evolving Threat Landscape: New Tactics Attacking User Identities docs.google.com/spreadsheets/d… #CybersecurityThreats #EvolvingThreatLandscape #UserIdentities #CredentialTheft #PhishingAttacks #SocialEngineering #IdentityExploits #PrivilegeEscalation #LateralMovement #Security

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Ethical Hacking Challenges: Overcoming Obfuscation and Limited Log Data docs.google.com/spreadsheets/d… #PenetrationTesting #PenTesting #EthicalHacking #LowImpactPenTest #MinimizedLogging #StealthyTechniques #LateralMovement #PrivilegeEscalation #RedTeaming #ImprovedSecurityPosture

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Prioritizing Print Security to Prevent Attacks docs.google.com/spreadsheets/d… #PrintSecurity #WindowsSecurity #Cybersecurity #PrintSpoolerVulnerability #PatchManagement #SecurityUpdates #LeastPrivilege #SecurityBestPractices #MultiFactorAuthentication #ReducedAttackSurface #Enhanced

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Streamlining User Management: Optimizing Active Directory for Efficiency docs.google.com/spreadsheets/d… #ActiveDirectory #UserManagement #Efficient #ProductivityBoost #ReducedITWorkload #SimplifiedOperations #Automation #GroupPolicy #LeastPrivilege #EnhancedSecurity

Unarmed Warriors (@unarmedwarriors) 's Twitter Profile Photo

Lessons Learned: Analyzing Explosions to Improve Safety Measures #ExplosionSafety #BlastAnalysis #SafetyFirst #PreventFutureTragedy #SafetyLessons #PostBlastEvaluation #ImprovingSafetyProtocols #EngineeringBestPractices #ProcessSafetyManagement #AccidentInvestigation