PinnedBuild a Azure Cloud Lab for Cyber Security TrainingYou may not have a server or a good computer for cyber security practice with virtual machines. Today we will create an Azure Lab for cyber…Mar 5Mar 5
PinnedSEP Create Exception PolicyAs an SEP admin sometimes you need exclude some legit applications from your environment. Server owners can demand MSSQL or Cisco Jabber…Feb 25Feb 25
PinnedGolden Ticket Attack Explaining ( From The Blue Team Perspective)If you want to be a king, you must wear a crown. If you want to be the king of a network, then you need a Golden Ticket.Jul 19, 20222Jul 19, 20222
PinnedWhat is going on at background when connect to any website ?That’s right. You saw right. I’m gonna explain what is going on at background when connect this Medium website. If you eager about Cyber…Mar 6, 2023Mar 6, 2023
Create Symantec Endpoint Protection Custom IPS RuleIf you use Symantec Endpoint Protection you may need custom IPS rule for prevent your endpoints from attackers. SEP client has default IPS…Oct 15, 2023Oct 15, 2023
Invisible Intruders: The Rise of Fileless MalwareFileless Malware: The Stealthy Threat That’s Hard to DetectMay 5, 2023May 5, 2023
Mr. Gamer Write Up (Cyberdefenders.org)We are solving Mr. Gamer room today. This room include linux forensic and little bit gaming. Let’s dive to Mr. Gamer room. I used autopsy…Aug 8, 2022Aug 8, 2022
Is Windows Defender Bullshit ?Have you ever been blocked by Windows Defender while downloading a file from a website that you think is a reliable source? In such cases…Jun 29, 20221Jun 29, 20221