This section is going to be primarily focused on General OS Hardening techniques that I have in my career either exploited, or been on the receiving end of incident response work on.
Inside each section will be breakdowns for how to do each technique I have, as well as any scripts, or easier ways to roll it out.
I have broken the sections down by Operating System (OS) seen below:
- Windows OS Hardening Techniques
- Linux / Unix OS Hardening Techniques
- MacOS Hardening Techniques