Saniye NurQuick Guide to Windows Registry HivesScenario Anna, the IR lead at Deer Inc., is investigating suspicious activity on one of the systems. She had been tipped off due to a new…Jun 2Jun 2
Saniye NurUnderstanding Insecure Deserialization: Risks and MitigationsUser-provided input has long been a significant source of vulnerabilities, presenting ongoing risks across many platforms and applications…May 23May 23
Saniye NurRecovering Active DirectoryWelcome to the last content of the year. It seems ironic that I will close this year with Active Directory, but I also mentioned AD…Dec 21, 2023Dec 21, 2023
Saniye NurDefensive Strategies Against AD MisconfigurationsDefensive Strategies Against AD Misconfigurations: Basic Principles to KnowNov 23, 2023Nov 23, 2023
Saniye NurSplunk: Data ManipulationData manipulation in products like Splunk refers to various operations performed to make data more meaningful and useful. These products…Oct 22, 2023Oct 22, 2023
Saniye NurA look into the Preparation phase of the Incident ResponseAn observed occurrence within a system refers to an event, incident, or happening that is noticed, recorded, or detected within that…Sep 10, 2023Sep 10, 2023
Saniye NurIncident Response Framework’s Second Phase: Understanding Identification & ScopingUnderstanding Security Alert Nature: Explore the nature of security alerts and their implications within the context of incident response.Sep 4, 2023Sep 4, 2023
Saniye NurBlended Two Machines and Its SolutionI realized that I haven’t solved the machine-challenge for a long time. And I realized that I missed a lot.Aug 19, 2023Aug 19, 2023