Tryhackme Encryption? What encryption?I will try to answer questions regarding the following scenario. I will decrypt the encrypted SMB traffic.Aug 24Aug 24
EN-Defending APIs: Blue Team Strategies for Incident Response and RecoveryIn this article, I will discuss REST APIs used in modern web applications, which we have been hearing a lot about lately, from a Blue Team…Jul 29Jul 29
TR-Defending APIs: Blue Team Strategies for Incident Response and RecoveryBu yazıda, özellikle adını son zamanlarda sıkça duydugumuz modern web uygulamalarında kullanılan REST API’i Blueteam bakış açısıyla…Jul 29Jul 29
Quick Guide to Windows Registry HivesScenario Anna, the IR lead at Deer Inc., is investigating suspicious activity on one of the systems. She had been tipped off due to a new…Jun 2Jun 2
Understanding Insecure Deserialization: Risks and MitigationsUser-provided input has long been a significant source of vulnerabilities, presenting ongoing risks across many platforms and applications…May 23May 23
Recovering Active DirectoryWelcome to the last content of the year. It seems ironic that I will close this year with Active Directory, but I also mentioned AD…Dec 21, 2023Dec 21, 2023
Defensive Strategies Against AD MisconfigurationsDefensive Strategies Against AD Misconfigurations: Basic Principles to KnowNov 23, 2023Nov 23, 2023
Splunk: Data ManipulationData manipulation in products like Splunk refers to various operations performed to make data more meaningful and useful. These products…Oct 22, 2023Oct 22, 2023