PinnedMr. Gamer Write Up (Cyberdefenders.org)We are solving Mr. Gamer room today. This room include linux forensic and little bit gaming. Let’s dive to Mr. Gamer room. I used autopsy tool for this investigation. #1 I use print statements for my logging -> What is the name of the utility/library the user was looking at exploits…3 min read
PinnedIf you see this PowerShell Commands on your pc, sorry you probably got hackedIf you suspicious to hacked your computer and you do not have any experience about cybersecurity field, you are correct place. But since you are following my Medium account, there is no need to panic. When attacked, the attacker will likely use the powershell application for privilege escalation or lateral…Cybersecurity3 min read
PinnedGolden Ticket Attack Explaining ( From The Blue Team Perspective)If you want to be a king, you must wear a crown. If you want to be the king of a network, then you need a Golden Ticket. With the Golden Ticket attack, the attacker can exploit a vulnerability in Kerberos to give the Domain Controller machine the impression of…Cybersecurity4 min read
Jul 5Fantastic.71BMoe (Brad Moore)Thanks for your response.Thanks for your response. This kind of comments is giving to me motivation. Good luck to you and your team.1 min readThanks for your response. This kind of comments is giving to me motivation. Good luck to you and your team.----
Jun 29Is Windows Defender Bullshit ?Have you ever been blocked by Windows Defender while downloading a file from a website that you think is a reliable source? In such cases one thinks “This Windows Defender is bullshit”. Well, is it really so? What is Windows Defender ? Formerly known as Microsoft AntiSpyware and Windows Defender, the software was originally based…Cybersecurity3 min read
Jun 26Collect Windows logs with WinlogbeatAccording to the 2022 report of Operating System Market Share Worldwide, the most used operating system in the world is still windows with 29 percent. According to the report of the Statista website, the most malicious software in 2020 was written for the windows operating system with a rate of…Cybersecurity2 min read
Jun 10Write Your First YARA RuleIf you want that your company or yourself take action against the apt groups, i have an idea for you. You can avoid being the focus of these attacks by writing YARA rules. YARA is a free and open-source tool aimed at helping security staff detect and classify malware. …Cybersecurity2 min read
Published in System Weakness·Jun 8Volatility Guide For Cyber Security AnalystsIf you’re a fish in cybersecurity and haven’t heard of the volatility2 framework, don’t worry, you will soon. Participating in the incident response process is essential to becoming a cybersecurity analyst. This changes your perspective on cyber incidents and shows how weak you are from the perspective of the attacker…Cybersecurity3 min read
Jun 6Let’s Defend Follina 0-Day Detected Write UpIf you have a free trialer account at let’s defend, the first day of every month is like Christmas for you. Because they loads 15 free investigation on your account. Follina is very interesting investigation for me. So Let’s deep dive into 0-Day investigation.Zero Day3 min read
Jun 4Cyberdefenders ELASTIC CASE write upCyberdefenders is a big opportunity for cyber security analysts. Platform has a very different rooms for investigate for cyber crimes. One of them is the elastic case room in which it gives you a server with an Elk stack deployed. Let’s deep dive into the ELK stack !! We will…Cybersecurity5 min read