Arslan SabirinSystem WeaknessWHOIS Lookup for Domain Information Using PythonIntroduction4 min read·Sep 30, 2023----
Arslan SabirinSystem WeaknessWindows RDP Event Logs: Part-2In the previous blog we talked about the logging of RDP logs if you had not read the previous blog please find below link:5 min read·Jun 4, 2023----
Arslan SabirinSystem WeaknessWindows RDP Event Logs: Part-1Remote Desktop Protocol (RDP) is a widely used technology that allows users to connect remotely to another computer or server over a…4 min read·Jun 1, 2023--1--1
Arslan SabirinSystem WeaknessPractical Malware Analysis (.PDF)In this blog we are going to analyze a malicious Pdf file. We are going to use multiple tools for analysis. Mainly we are going to use…4 min read·Feb 9, 2022----
Arslan SabirinSystem WeaknessPractical Malware Analysis (Introduction)Malware is a file or code, typically delivered over a network, that infects explores steals or conducts virtually any behavior on attacker…2 min read·Feb 8, 2022----
Arslan SabirinSystem WeaknessHow to Map Data Sources against MITRE ATT&ACK TechniquesFrom my previous blog you should have known how to installed DeTT&CT Editor, now we are going to use DeTT&CT for mapping data sources…2 min read·Jan 20, 2022----
Arslan SabirinSystem WeaknessHow to Download DeTT&CT Editor For MITRE ATT&ACK TechniquesBy creating DeTT&CT we aim to assist blue teams using ATT&CK to score and compare data log source quality, visibility coverage, detection…1 min read·Jan 20, 2022----