Open in app

Sign in

Write

Sign in

Saniye Nur
Saniye Nur

168 Followers

Home

About

Nov 23

Defensive Strategies Against AD Misconfigurations

Defensive Strategies Against AD Misconfigurations: Basic Principles to Know Active Directory (AD) is a directory service developed by Microsoft. This system centrally stores and manages critical information such as user accounts, computer accounts, groups, and other network resources. …

Active Directory

7 min read

Defensive Strategies Against AD Misconfigurations
Defensive Strategies Against AD Misconfigurations
Active Directory

7 min read


Oct 22

Splunk: Data Manipulation

Data manipulation in products like Splunk refers to various operations performed to make data more meaningful and useful. These products are data analytics and security information management platforms that can collect, index, and analyze large volumes of data from different sources. Here are some data manipulation operations performed in products…

Splunk

9 min read

Splunk: Data Manipulation
Splunk: Data Manipulation
Splunk

9 min read


Sep 10

A look into the Preparation phase of the Incident Response

An observed occurrence within a system refers to an event, incident, or happening that is noticed, recorded, or detected within that system. It can encompass a wide range of activities, behaviors, or incidents that are observed and documented for various purposes, such as monitoring, analysis, troubleshooting, or evaluation. In various…

Incident Response

8 min read

A look into the Preparation phase of the Incident Response
A look into the Preparation phase of the Incident Response
Incident Response

8 min read


Sep 4

Incident Response Framework’s Second Phase: Understanding Identification & Scoping

Understanding Security Alert Nature: Explore the nature of security alerts and their implications within the context of incident response. Gathering Additional Evidence: Delve into the process of collecting supplementary evidence to enhance incident understanding and resolution. Importance of Asset Inventory and Spreadsheet of Doom: Recognize the significance of maintaining an accurate…

Incident Response

11 min read

Incident Response Framework’s Second Phase: Understanding Identification & Scoping
Incident Response Framework’s Second Phase: Understanding Identification & Scoping
Incident Response

11 min read


Aug 19

Blended Two Machines and Its Solution

I realized that I haven’t solved the machine-challenge for a long time. And I realized that I missed a lot. That’s why I couldn’t get up to speed and decided to blend the two machines and write you a Walkthrough. A blueteamlabs.online machine and a cyberdefenders machine

Digital Forensics

10 min read

Blended Two Machines and Its Solution
Blended Two Machines and Its Solution
Digital Forensics

10 min read


Jul 23

Docker Host Security and Docker Forensics

What if we get a vulnerable WebApp (say RCE/CI) running on a Kubernetes pod ? Actually, in this blog post, we will look into the answers to this question with the support of Attackdefense labs. Kubernetes is a popular container orchestration platform. Containers are a technology that packages all the…

Docker Security

17 min read

Docker Host Security and Docker Forensics
Docker Host Security and Docker Forensics
Docker Security

17 min read


Jun 11

Cloud DFIR -2-

We said “Next article will talk about EC2 Incident Response and Forensic Analysis, Margarita Shotgun, a Remote Memory Acquisition Tool, aws_ir tool.” Let’s continue. Every EC2 (Elastic Compute Cloud) instance in Amazon Web Services (AWS) consists of a root volume. The root volume is the primary storage device attached to…

Ec2 Instance

8 min read

Cloud DFIR -2-
Cloud DFIR -2-
Ec2 Instance

8 min read


Apr 21

Why Cloud DFIR ?

According to Forrester and Gartner Studies 75% of enterprise servers are virtualized With the increasing adoption of cloud computing by organizations for storing, processing, and managing their data and applications, it has become essential to have specific DFIR practices tailored for cloud-based environments. 50% of all enterprises are in a…

Aws Cloud

11 min read

Why Cloud DFIR ?
Why Cloud DFIR ?
Aws Cloud

11 min read


Mar 7

Linux Forensics -2-

Hello again. I haven’t been able to write for a while because of the sad event that shook my country. But I have seen people who follow, like and want me to continue writing.That’s why I said let’s get together as soon as possible and not continue to write and…

Linux

9 min read

Linux Forensics -2-
Linux Forensics -2-
Linux

9 min read


Jan 2

Developing hypotheses for Threat Hunting with ChatGPT

Can you create a hypothesis for threat hunting scenarios? A hypothesis is a proposed explanation for a phenomenon that can be tested through further investigation. …

ChatGPT

21 min read

Developing hypotheses for Threat Hunting with ChatGPT
Developing hypotheses for Threat Hunting with ChatGPT
ChatGPT

21 min read

Saniye Nur

Saniye Nur

168 Followers

DIGITAL FORENSICS ENGINEER https://www.linkedin.com/in/saniye-nurc/

Following
  • Ahmet Göker

    Ahmet Göker

  • Jim Clyde Monge

    Jim Clyde Monge

  • Snyk

    Snyk

  • Ali Murat Tava

    Ali Murat Tava

  • Mehmet Ergene

    Mehmet Ergene

See all (82)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams