Open in app

Sign In

Write

Sign In

Saniye Nur
Saniye Nur

161 Followers

Home

About

Sep 10

A look into the Preparation phase of the Incident Response

An observed occurrence within a system refers to an event, incident, or happening that is noticed, recorded, or detected within that system. It can encompass a wide range of activities, behaviors, or incidents that are observed and documented for various purposes, such as monitoring, analysis, troubleshooting, or evaluation. In various…

Incident Response

8 min read

A look into the Preparation phase of the Incident Response
A look into the Preparation phase of the Incident Response
Incident Response

8 min read


Sep 4

Incident Response Framework’s Second Phase: Understanding Identification & Scoping

Understanding Security Alert Nature: Explore the nature of security alerts and their implications within the context of incident response. Gathering Additional Evidence: Delve into the process of collecting supplementary evidence to enhance incident understanding and resolution. Importance of Asset Inventory and Spreadsheet of Doom: Recognize the significance of maintaining an accurate…

Incident Response

11 min read

Incident Response Framework’s Second Phase: Understanding Identification & Scoping
Incident Response Framework’s Second Phase: Understanding Identification & Scoping
Incident Response

11 min read


Aug 19

Blended Two Machines and Its Solution

I realized that I haven’t solved the machine-challenge for a long time. And I realized that I missed a lot. That’s why I couldn’t get up to speed and decided to blend the two machines and write you a Walkthrough. A blueteamlabs.online machine and a cyberdefenders machine

Digital Forensics

10 min read

Blended Two Machines and Its Solution
Blended Two Machines and Its Solution
Digital Forensics

10 min read


Jul 23

Docker Host Security and Docker Forensics

What if we get a vulnerable WebApp (say RCE/CI) running on a Kubernetes pod ? Actually, in this blog post, we will look into the answers to this question with the support of Attackdefense labs. Kubernetes is a popular container orchestration platform. Containers are a technology that packages all the…

Docker Security

17 min read

Docker Host Security and Docker Forensics
Docker Host Security and Docker Forensics
Docker Security

17 min read


Jun 11

Cloud DFIR -2-

We said “Next article will talk about EC2 Incident Response and Forensic Analysis, Margarita Shotgun, a Remote Memory Acquisition Tool, aws_ir tool.” Let’s continue. Every EC2 (Elastic Compute Cloud) instance in Amazon Web Services (AWS) consists of a root volume. The root volume is the primary storage device attached to…

Ec2 Instance

8 min read

Cloud DFIR -2-
Cloud DFIR -2-
Ec2 Instance

8 min read


Apr 21

Why Cloud DFIR ?

According to Forrester and Gartner Studies 75% of enterprise servers are virtualized With the increasing adoption of cloud computing by organizations for storing, processing, and managing their data and applications, it has become essential to have specific DFIR practices tailored for cloud-based environments. 50% of all enterprises are in a…

Aws Cloud

11 min read

Why Cloud DFIR ?
Why Cloud DFIR ?
Aws Cloud

11 min read


Mar 7

Linux Forensics -2-

Hello again. I haven’t been able to write for a while because of the sad event that shook my country. But I have seen people who follow, like and want me to continue writing.That’s why I said let’s get together as soon as possible and not continue to write and…

Linux

9 min read

Linux Forensics -2-
Linux Forensics -2-
Linux

9 min read


Jan 2

Developing hypotheses for Threat Hunting with ChatGPT

Can you create a hypothesis for threat hunting scenarios? A hypothesis is a proposed explanation for a phenomenon that can be tested through further investigation. In the context of threat hunting, a hypothesis might be a proposed explanation for suspicious or anomalous activity that has been observed on a network…

ChatGPT

21 min read

Developing hypotheses for Threat Hunting with ChatGPT
Developing hypotheses for Threat Hunting with ChatGPT
ChatGPT

21 min read


Dec 18, 2022

Linux Forensics -1-

The following topics will be covered in this series of articles: Live Response Human interactions Creating a live response kit Transporting data across a network Collecting volatile data Determining if dead analysis is justified Dumping RAM Acquiring filesystem images Using dd Using dcfldd Write blocking Software blockers Udev rules Forensic…

Linux Forensics

6 min read

Linux Forensics -1-
Linux Forensics -1-
Linux Forensics

6 min read


Nov 9, 2022

Linux Server Forensics

Before starting the Linux Server Analysis, the event we will go into is to examine a web server with Linux installed and additionally to look at Apache Log Analysis, Web Server Analysis, possible persistence mechanisms. Here we will try to see potential web attacks by making inferences from both analysis…

Linux Forensics

7 min read

Linux Server Forensics
Linux Server Forensics
Linux Forensics

7 min read

Saniye Nur

Saniye Nur

161 Followers

DIGITAL FORENSICS ENGINEER https://www.linkedin.com/in/saniye-nurc/

Following
  • Ahmet Göker

    Ahmet Göker

  • Mabrouk Mahdhi

    Mabrouk Mahdhi

  • GDB HackerOne

    GDB HackerOne

  • Florian Roth

    Florian Roth

  • bilal al-qurneh

    bilal al-qurneh

See all (83)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams