Browse Source

fix(docs): corrects common typos in project documentation

pull/40/head
plan-do-break-fix 9 months ago
parent
commit
02557cbc62
10 changed files with 10 additions and 10 deletions
  1. +1
    -1
      Draft/CandE.md
  2. +1
    -1
      Draft/Career.md
  3. +1
    -1
      Draft/Crypto_Encrypt.md
  4. +1
    -1
      Draft/DFIR.md
  5. +1
    -1
      Draft/Defense.md
  6. +1
    -1
      Draft/L-SM-TH.md
  7. +1
    -1
      Draft/Malware.md
  8. +1
    -1
      Draft/Network_Attacks.md
  9. +1
    -1
      Draft/PrivescPostEx.md
  10. +1
    -1
      Draft/honeypot.md

+ 1
- 1
Draft/CandE.md View File

@ -294,7 +294,7 @@ From: https://www.reddit.com/r/securityengineering/comments/7o2uzy/a_collection_
* **Encryption Software**
* [VeraCrypt](https://www.veracrypt.fr/en/Home.html)
* VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a.
* **Key Managment**
* **Key Management**
* [CONIKS](https://coniks.cs.princeton.edu/)
* CONIKS is a key management system for end users capable of integration in end-to-end secure communication services. The main idea is that users should not have to worry about managing encryption keys when they want to communicate securely, but they also should not have to trust their secure communication service providers to act in their interest.
* **Hash Identification**


+ 1
- 1
Draft/Career.md View File

@ -425,7 +425,7 @@
* [Loyalty and Layoffs - David Brady](https://whydavewhy.com/2013/08/16/loyalty-and-layoffs/)
* **Management**<a name="mgmt"></a>
* **101**
* [HN Comment by walterbell on understanding managment](https://news.ycombinator.com/item?id=8881752)
* [HN Comment by walterbell on understanding management](https://news.ycombinator.com/item?id=8881752)
* [The Manager FAQ - Peter Seebach](http://www.seebs.net/faqs/manager.html)
* The following list is an attempt to cover some of the issues that will invariably come up when hackers without previous experience of the business community first start working in it. Other workers may also find it informative.
* [Choosing the Management Track - blog.danielna.com](https://blog.danielna.com/choosing-the-management-track/)


+ 1
- 1
Draft/Crypto_Encrypt.md View File

@ -277,7 +277,7 @@ From: https://www.reddit.com/r/securityengineering/comments/7o2uzy/a_collection_
* **Encryption Software**
* [VeraCrypt](https://www.veracrypt.fr/en/Home.html)
* VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a.
* **Key Managment**
* **Key Management**
* [CONIKS](https://coniks.cs.princeton.edu/)
* CONIKS is a key management system for end users capable of integration in end-to-end secure communication services. The main idea is that users should not have to worry about managing encryption keys when they want to communicate securely, but they also should not have to trust their secure communication service providers to act in their interest.
* **Hash Identification**


+ 1
- 1
Draft/DFIR.md View File

@ -772,7 +772,7 @@
* [Kansa -A Powershell incident response framework ](https://github.com/davehull/Kansa)
* A modular incident response framework in Powershell. Note there's a bug that's currently cropping up in PowerShell version 2 systems, but version 3 and later should be fine
* [Meerkat](https://github.com/TonyPhipps/Meerkat)
* Meerkat is collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints. Use cases include incident response triage, threat hunting, baseline monitoring, snapshot comparisons, and more.
* Meerkat is collection of PowerShell modules designed for artifact gathering and reconnaissance of Windows-based endpoints. Use cases include incident response triage, threat hunting, baseline monitoring, snapshot comparisons, and more.
* **Processes**
* [PE-sieve](https://github.com/hasherezade/pe-sieve)
* PE-sieve is a tool that helps to detect malware running on the system, as well as to collect the potentially malicious material for further analysis. Recognizes and dumps variety of implants within the scanned process: replaced/injected PEs, shellcodes, hooks, and other in-memory patches.


+ 1
- 1
Draft/Defense.md View File

@ -763,7 +763,7 @@
* [PPRT](https://github.com/MSAdministrator/PPRT)
* This module is used to report phishing URLs to their WHOIS/RDAP abuse contact information.
* [PhishingKitHunter](https://github.com/t4d/PhishingKitHunter)
* PhishingKitHunter (or PKHunter) is a tool made for identifying phishing kits URLs used in phishing campains targeting your customers and using some of your own website files (as CSS, JS, ...). This tool - write in Python 3 - is based on the analysis of referer's URL which GET particular files on the legitimate website (as some style content) or redirect user after the phishing session. Log files (should) contains the referer URL where the user come from and where the phishing kit is deployed. PhishingKitHunter parse your logs file to identify particular and non-legitimate referers trying to get legitimate pages based on regular expressions you put into PhishingKitHunter's config file.
* PhishingKitHunter (or PKHunter) is a tool made for identifying phishing kits URLs used in phishing campaigns targeting your customers and using some of your own website files (as CSS, JS, ...). This tool - write in Python 3 - is based on the analysis of referer's URL which GET particular files on the legitimate website (as some style content) or redirect user after the phishing session. Log files (should) contains the referer URL where the user come from and where the phishing kit is deployed. PhishingKitHunter parse your logs file to identify particular and non-legitimate referers trying to get legitimate pages based on regular expressions you put into PhishingKitHunter's config file.
* [Hunting-Newly-Registered-Domains](https://github.com/gfek/Hunting-New-Registered-Domains)
* The hnrd.py is a python utility for finding and analysing potential phishing domains used in phishing campaigns targeting your customers. This utility is written in python (2.7 and 3) and is based on the analysis of the features below by consuming a free daily list provided by the Whoisds site.
* [SwiftFilter](https://github.com/SwiftOnSecurity/SwiftFilter)


+ 1
- 1
Draft/L-SM-TH.md View File

@ -1017,7 +1017,7 @@
* [BLUESPAWN](https://github.com/ION28/BLUESPAWN)
* BLUESPAWN is an active defense and endpoint detection and response tool which means it can be used by defenders to quickly detect, identify, and eliminate malicious activity and malware across a network.
* [CimSweep](https://github.com/PowerShellMafia/CimSweep)
* CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows. CimSweep may also be used to engage in offensive reconnaisance without the need to drop any payload to disk.
* CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows. CimSweep may also be used to engage in offensive reconnaissance without the need to drop any payload to disk.
* **Cloud**<a name='cloud'></a>
* **AWS**<a name="aws"></a>
* **Articles/Writeups**


+ 1
- 1
Draft/Malware.md View File

@ -531,7 +531,7 @@ https://medium.com/@tarcisioma/ransomware-encryption-techniques-696531d07bb9
* From the secure deployment to the aggregation of thousands of events MHN provides enteprise grade management of the most current open source honeypot software. MHN is completely free open source software which supports external and internal honeypot deployments at a large and distributed scale. MHN uses the HPFeeds standard and low-interaction honeypots to keep effectiveness and security at enterprise grade levels. MHN provides full REST API out of the box and we are making CEF and STIX support available now for direct SIEM integration through our Commercial platform Optic.
* [Honeypot Farming: Setup Modern Honey Network](https://medium.com/@theroxyd/honeypot-farming-setup-mhn-f07d241fcac6)
* [Beeswarm](http://www.beeswarm-ids.org/)
* Beeswarm is a honeypot project which provides easy configuration, deployment and managment of honeypots. Beeswarm operates by deploying fake end-user systems (clients) and services (honeypots). Beeswarm uses these systems to provides IoC (Indication of Compromise) by observing the difference between expected and actual traffic.
* Beeswarm is a honeypot project which provides easy configuration, deployment and management of honeypots. Beeswarm operates by deploying fake end-user systems (clients) and services (honeypots). Beeswarm uses these systems to provides IoC (Indication of Compromise) by observing the difference between expected and actual traffic.
* [Github](https://github.com/honeynet/beeswarm)
* [Honeywall Project](https://projects.honeynet.org/honeywall/)
* The goal of this page is to provide you the latest documentation, source code, distribution, and information for the Honeynet Project's Honeywall CDROM. The Honeywall CDROM is a bootable CD that installs onto a hard drive and comes with all the tools and functionality for you to implement data capture, control and analysis.


+ 1
- 1
Draft/Network_Attacks.md View File

@ -411,7 +411,7 @@
------------
### <a name="ipmi"></a>BMCs/IPMI/iDRAC/Similar
* **101**
* [Intelligent Platform Managment Interface Documentation - Intel](https://www.intel.com/content/www/us/en/servers/ipmi/ipmi-home.html)
* [Intelligent Platform Management Interface Documentation - Intel](https://www.intel.com/content/www/us/en/servers/ipmi/ipmi-home.html)
* [IPMI Basics](https://www.thomas-krenn.com/en/wiki/IPMI_Basics)
* [Intelligent Platform Management Interface - Wikipedia](https://en.wikipedia.org/wiki/Intelligent_Platform_Management_Interface)
* [Redfish](https://www.dmtf.org/standards/redfish)


+ 1
- 1
Draft/PrivescPostEx.md View File

@ -1186,7 +1186,7 @@
* **MacOS Red Teaming Blogpost Series by Action Dan(2019)**
* [MacOS Red Teaming 201: Introduction - Action Dan](https://lockboxx.blogspot.com/2019/03/macos-red-teaming-201-introduction.html)
* [MacOS Red Teaming 202: Profiles - Action Dan](https://lockboxx.blogspot.com/2019/03/macos-red-teaming-202-profiles.html)
* [MacOS Red Teaming 203: MDM (Mobile Device Managment - Action Dan)](https://lockboxx.blogspot.com/2019/04/macos-red-teaming-203-mdm-mobile-device.html)
* [MacOS Red Teaming 203: MDM (Mobile Device Management - Action Dan)](https://lockboxx.blogspot.com/2019/04/macos-red-teaming-203-mdm-mobile-device.html)
* [MacOS Red Teaming 204: Munki Business - Action Dan](https://lockboxx.blogspot.com/2019/04/macos-red-teaming-204-munki-business.html)
* [MacOS Red Teaming 205: TCC (Transparency, Consent, and Control - Action Dan)](https://lockboxx.blogspot.com/2019/04/macos-red-teaming-205-tcc-transparency.html)
* [MacOS Red Teaming 206: ARD (Apple Remote Desktop Protocol - Action Dan)](https://lockboxx.blogspot.com/2019/07/macos-red-teaming-206-ard-apple-remote.html)


+ 1
- 1
Draft/honeypot.md View File

@ -42,7 +42,7 @@ https://github.com/4sp1r3/honeytrap
* From the secure deployment to the aggregation of thousands of events MHN provides enteprise grade management of the most current open source honeypot software. MHN is completely free open source software which supports external and internal honeypot deployments at a large and distributed scale. MHN uses the HPFeeds standard and low-interaction honeypots to keep effectiveness and security at enterprise grade levels. MHN provides full REST API out of the box and we are making CEF and STIX support available now for direct SIEM integration through our Commercial platform Optic.
* [Honeypot Farming: Setup Modern Honey Network](https://medium.com/@theroxyd/honeypot-farming-setup-mhn-f07d241fcac6)
* [Beeswarm](http://www.beeswarm-ids.org/)
* Beeswarm is a honeypot project which provides easy configuration, deployment and managment of honeypots. Beeswarm operates by deploying fake end-user systems (clients) and services (honeypots). Beeswarm uses these systems to provides IoC (Indication of Compromise) by observing the difference between expected and actual traffic.
* Beeswarm is a honeypot project which provides easy configuration, deployment and management of honeypots. Beeswarm operates by deploying fake end-user systems (clients) and services (honeypots). Beeswarm uses these systems to provides IoC (Indication of Compromise) by observing the difference between expected and actual traffic.
* [Github](https://github.com/honeynet/beeswarm)
* [Honeywall Project](https://projects.honeynet.org/honeywall/)
* The goal of this page is to provide you the latest documentation, source code, distribution, and information for the Honeynet Project's Honeywall CDROM. The Honeywall CDROM is a bootable CD that installs onto a hard drive and comes with all the tools and functionality for you to implement data capture, control and analysis.


Loading…
Cancel
Save