INCIBE-CERT

Contenido INCIBE-CERT

 

ICS Matrix: Unauthorized initial access. Part 1

Posted on 24/04/2025, by
INCIBE (INCIBE)
Acceso inicial no autorizado a equipos SCI. Candados, password, mapa del mundo, código binario.
The Initial Access tactic is one of the 12 tactics that make up the matrix developed by MITRE for industrial environments (for more information on the matrix, feel free to consult the article ICS Matrix, the State of v11). Within this tactic, different techniques used by attackers with the aim of gaining unauthorized access to an industrial environment are shown. This is often the first target of external attackers, as access to the ICS's internal environment allows internal computers to be recognized and exploited, move around the network, gain elevated privileges, or steal sensitive information. Therefore, it is important to know this tactic in order to defend our systems

Windows forensic keys: essential artifacts for digital investigation

Updated on 20/03/2025, by
INCIBE (INCIBE)
Windows forensic keys: essential artifacts for digital investigation
In the digital forensic analysis of Windows systems, artefacts such as event logs, prefetch files, LNK files or the Windows Registry are essential for the investigation of cyber incidents. These artefacts are characterised by the storage of detailed information about system and user activities, allowing the identification of malicious actions, the tracking of attackers' movements and the reconstruction of timelines of critical events. Thanks to these, attack techniques such as command execution, persistence and evasion of system defences can be detected. Knowledge about the collection and analysis of these artefacts ensures accurate and efficient analysis. Therefore, contextualising the relevance of these artefacts helps cybersecurity professionals to strengthen their detection and response capabilities, thus ensuring the integrity of collected evidence and improving the effectiveness of digital forensic investigations.

Exploring the Nmap scripting module

Posted on 20/02/2025, by
INCIBE (INCIBE)
Binary code 0 and 1
Nmap (Network Mapper) is a widely recognized tool in the field of computer security and network administration. Its popularity lies in its ability to map networks and detect active services on connected devices. Since its inception in 1997, by Gordon Lyon, Nmap has been one of the most trusted tools for performing security analysis, identifying open ports, and services available on remote hosts. Over the years, the tool has evolved and adapted to the growing demands of the cybersecurity field.

Vulnerabilities

Check our database with information in Spanish about the latest documented and known vulnerabilities.

Guides and studies

Advanced practical and theoretical content on cybersecurity for technicians.

Service for operators

Set of services we offer for strategic operators.

Servicio para operadores