Saniye NurTryhackme Encryption? What encryption?I will try to answer questions regarding the following scenario. I will decrypt the encrypted SMB traffic.Aug 24Aug 24
Saniye NurEN-Defending APIs: Blue Team Strategies for Incident Response and RecoveryIn this article, I will discuss REST APIs used in modern web applications, which we have been hearing a lot about lately, from a Blue Team…Jul 29Jul 29
Saniye NurTR-Defending APIs: Blue Team Strategies for Incident Response and RecoveryBu yazıda, özellikle adını son zamanlarda sıkça duydugumuz modern web uygulamalarında kullanılan REST API’i Blueteam bakış açısıyla…Jul 29Jul 29
Saniye NurQuick Guide to Windows Registry HivesScenario Anna, the IR lead at Deer Inc., is investigating suspicious activity on one of the systems. She had been tipped off due to a new…Jun 2Jun 2
Saniye NurUnderstanding Insecure Deserialization: Risks and MitigationsUser-provided input has long been a significant source of vulnerabilities, presenting ongoing risks across many platforms and applications…May 23May 23
Saniye NurRecovering Active DirectoryWelcome to the last content of the year. It seems ironic that I will close this year with Active Directory, but I also mentioned AD…Dec 21, 2023Dec 21, 2023
Saniye NurDefensive Strategies Against AD MisconfigurationsDefensive Strategies Against AD Misconfigurations: Basic Principles to KnowNov 23, 2023Nov 23, 2023
Saniye NurSplunk: Data ManipulationData manipulation in products like Splunk refers to various operations performed to make data more meaningful and useful. These products…Oct 22, 2023Oct 22, 2023