Published inSystem WeaknessWHOIS Lookup for Domain Information Using PythonIntroductionSep 30, 2023Sep 30, 2023
Published inSystem WeaknessWindows RDP Event Logs: Part-2In the previous blog we talked about the logging of RDP logs if you had not read the previous blog please find below link:Jun 4, 2023Jun 4, 2023
Published inSystem WeaknessWindows RDP Event Logs: Part-1Remote Desktop Protocol (RDP) is a widely used technology that allows users to connect remotely to another computer or server over a…Jun 1, 20231Jun 1, 20231
Published inSystem WeaknessPractical Malware Analysis (.PDF)In this blog we are going to analyze a malicious Pdf file. We are going to use multiple tools for analysis. Mainly we are going to use…Feb 9, 2022Feb 9, 2022
Published inSystem WeaknessPractical Malware Analysis (Introduction)Malware is a file or code, typically delivered over a network, that infects explores steals or conducts virtually any behavior on attacker…Feb 8, 2022Feb 8, 2022
Published inSystem WeaknessHow to Map Data Sources against MITRE ATT&ACK TechniquesFrom my previous blog you should have known how to installed DeTT&CT Editor, now we are going to use DeTT&CT for mapping data sources…Jan 20, 2022Jan 20, 2022
Published inSystem WeaknessHow to Download DeTT&CT Editor For MITRE ATT&ACK TechniquesBy creating DeTT&CT we aim to assist blue teams using ATT&CK to score and compare data log source quality, visibility coverage, detection…Jan 20, 2022Jan 20, 2022