Open in app

Sign In

Write

Sign In

Saniye Nur
Saniye Nur

125 Followers

Home

About

Jan 2

Developing hypotheses for Threat Hunting with ChatGPT

Can you create a hypothesis for threat hunting scenarios? A hypothesis is a proposed explanation for a phenomenon that can be tested through further investigation. …

Chatgpt

21 min read

Developing hypotheses for Threat Hunting with ChatGPT
Developing hypotheses for Threat Hunting with ChatGPT
Chatgpt

21 min read


Dec 18, 2022

Linux Forensics -1-

The following topics will be covered in this series of articles: Live Response Human interactions Creating a live response kit Transporting data across a network Collecting volatile data Determining if dead analysis is justified Dumping RAM Acquiring filesystem images Using dd Using dcfldd Write blocking Software blockers Udev rules Forensic…

Linux Forensics

6 min read

Linux Forensics -1-
Linux Forensics -1-
Linux Forensics

6 min read


Nov 9, 2022

Linux Server Forensics

Before starting the Linux Server Analysis, the event we will go into is to examine a web server with Linux installed and additionally to look at Apache Log Analysis, Web Server Analysis, possible persistence mechanisms. Here we will try to see potential web attacks by making inferences from both analysis…

Linux Forensics

7 min read

Linux Server Forensics
Linux Server Forensics
Linux Forensics

7 min read


Sep 18, 2022

eCDFP Certification Experience

I recently took the Digital Forensics Professional (eCDFP) certification by eLearnSecurity and I decided to share my experience after passing the exam on my first attempt. Again, I decided to write a blog post to answer the questions from you. First of all, I will start by introducing the INE…

Digital Forensics

5 min read

eCDFP Certification Experience
eCDFP Certification Experience
Digital Forensics

5 min read


Sep 4, 2022

Windows Registry Analysis with Registry Explorer

The registry could be considered a special type of file system used by Microsoft Windows operating systems to store different settings. The registry stores low-level system settings,application settings, and user preferences and settings to. Why Examine the Registry? It could have a great effect on the examination.Below is a partial…

Windows Registry

5 min read

Windows Registry Analysis with Registry Explorer
Windows Registry Analysis with Registry Explorer
Windows Registry

5 min read


Published in Trendyol Tech

·Jul 19, 2022

MISP Threat Sharing

Hello, in this article, we will talk about the MISP platform that we actively use as Trendyol Security team, the problems it aims to solve, its relationship with threat intelligence and how we use MISP proactively. Primarily, MISP (Malware Information Sharing Platform) is an open source software that facilitates the…

Misp

8 min read

MISP Threat Sharing
MISP Threat Sharing
Misp

8 min read


Jul 1, 2022

eCTHPv2 Certification Experience

I recently took the Certified Threat Hunting Professional Version 2 (eCTHPv2) certification by eLearnSecurity and I decided to share my experience after passing the exam on my first attempt.Since I received questions about the exam from many of my friends, I felt the need to write here as well. Let…

Threat Hunting

5 min read

eCTHPv2 Certification Experience
eCTHPv2 Certification Experience
Threat Hunting

5 min read


May 28, 2022

Abusing Windows Internals

Windows Internals, Windows işletim sisteminin işleyişinin özüdür; bu da saldırgana kötüye kullanım için bir motive kaynağıdır. Windows’un Internals bileşenleri, kodu gizlemek ve yürütmek, detection yöntemlerinden kaçınmak veya açıklardan yararlanma ile zincirleme yapmak için kullanılabilir. Windows internals termleri arkada çalışan bütün işlemleri kapsayabilir. …

Process Injection

5 min read

Abusing Windows Internals
Abusing Windows Internals
Process Injection

5 min read


May 3, 2022

Wazuh ile Threat Hunting — 1

Bu seride aşağıdaki konuları öğrenmiş olacaksınız: EDR nedir ve ne amaçla kullanılır ? Wazuh gibi bir EDR nerede kullanılır ? Wazuh rule’ları ve alarmlaştırmaları, Wazuh ile Windows ve Linux ortamlarından log toplama, Threat Hunting yapabilmemiz için bir çok ürün mevcuttur. Edr’ da bu ürünlerden biridir, fakat tabiki threat hunting ürünlerden…

Wazuh

8 min read

Wazuh ile Threat Hunting — 1
Wazuh ile Threat Hunting — 1
Wazuh

8 min read


Mar 5, 2022

Email Security Mindmap

Tehditler: Yetkisiz kurum içinden birinin harici bir alıcıya e-posta göndermesi. Geçerli DNS etki alanından yetkisiz e-postalar (spoofing saldırısı) E-posta contect onaysız değişiklikler Phishing — E-dolandırıcılık Spear phishing — Yemleme DNS cache poisoning — DNS önbellek zehirlenmesi Hassas veriler içeren e-posta mesajlarına yetkisiz erişim. Açık sistemlere erişim Korumasız e-posta yedeklemesine erişim

Phishing

10 min read

Email Security Mindmap
Email Security Mindmap
Phishing

10 min read

Saniye Nur

Saniye Nur

125 Followers

DIGITAL FORENSICS ENGINEER https://cyberdefenders.org/accounts/profile/snynr

Following
  • Hacktivities

    Hacktivities

  • Mert Coskuner

    Mert Coskuner

  • Jim Clyde Monge

    Jim Clyde Monge

  • Erdinç Tandoğan

    Erdinç Tandoğan

  • Jonathan Johnson

    Jonathan Johnson

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech