Open in app

Sign in

Write

Sign in

Arslan Sabir
Arslan Sabir

75 Followers

Home

About

Published in

System Weakness

·Sep 30

WHOIS Lookup for Domain Information Using Python

Introduction An excellent source for learning about domain names is the WHOIS database. You can gain access to information about domain ownership, registration dates, contact details, and more. A WHOIS lookup can offer useful information, whether you’re researching domain names, looking into potential cybersecurity risks, or just curious about the background…

Cybersecurity

4 min read

WHOIS Lookup for Domain Information Using Python
WHOIS Lookup for Domain Information Using Python
Cybersecurity

4 min read


Published in

System Weakness

·Jun 4

Windows RDP Event Logs: Part-2

In the previous blog we talked about the logging of RDP logs if you had not read the previous blog please find below link: Windows RDP Event Logs: Identification, Tracking and Investigation Part-1 Remote Desktop Protocol (RDP) is a widely used technology that allows users to connect remotely to another computer or…arslansabir11.medium.com In this blog we will dive into a scenario involving the investigation of an RDP session. Remote Desktop Protocol (RDP) has become an essential tool for…

Rdp

5 min read

Windows RDP Event Logs: Part-2
Windows RDP Event Logs: Part-2
Rdp

5 min read


Published in

System Weakness

·Jun 1

Windows RDP Event Logs: Part-1

Remote Desktop Protocol (RDP) is a widely used technology that allows users to connect remotely to another computer or server over a network. As a powerful tool for remote administration, RDP has become an attractive target for cybercriminals. Detecting and investigating suspicious RDP sessions is crucial for identifying potential security…

Rdp

4 min read

Windows RDP Event Logs: Part-1
Windows RDP Event Logs: Part-1
Rdp

4 min read


Published in

System Weakness

·Feb 9, 2022

Practical Malware Analysis (.PDF)

In this blog we are going to analyze a malicious Pdf file. We are going to use multiple tools for analysis. Mainly we are going to use Didier stevens pdf tools. Tools To Have https://docs.remnux.org/install-distro/get-virtual-appliance https://blog.didierstevens.com/didier-stevens-suite/ Test Case: You are working as malware analyst in ABC Company and your EDR…

Cybersecurity

4 min read

Practical Malware Analysis (.PDF)
Practical Malware Analysis (.PDF)
Cybersecurity

4 min read


Published in

System Weakness

·Feb 8, 2022

Practical Malware Analysis (Introduction)

Malware is a file or code, typically delivered over a network, that infects explores steals or conducts virtually any behavior on attacker wants. Malware can infect devices and networks and can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browser) etc. …

Cybersecurity

2 min read

Practical Malware Analysis (Introduction)
Practical Malware Analysis (Introduction)
Cybersecurity

2 min read


Published in

System Weakness

·Jan 20, 2022

How to Map Data Sources against MITRE ATT&ACK Techniques

From my previous blog you should have known how to installed DeTT&CT Editor, now we are going to use DeTT&CT for mapping data sources against MITRE ATT&ACK. First we have to create a python virtual environment so all the dependencies of python work properly. For creating a virtual environment we…

Cybersecurity

2 min read

How to Map Data Sources against MITRE ATT&ACK Techniques
How to Map Data Sources against MITRE ATT&ACK Techniques
Cybersecurity

2 min read


Published in

System Weakness

·Jan 20, 2022

How to Download DeTT&CT Editor For MITRE ATT&ACK Techniques

By creating DeTT&CT we aim to assist blue teams using ATT&CK to score and compare data log source quality, visibility coverage, detection coverage and threat actor behaviors. All of which can help, in different ways, to get more resilient against attacks targeting your organization. Framework to administrate,score and compare: Data source quality Visibility Detection Threat actor behaviors Where do you focus on

Cybersecurity

1 min read

How to Download DeTT&CT Editor For MITRE ATT&ACK Techniques
How to Download DeTT&CT Editor For MITRE ATT&ACK Techniques
Cybersecurity

1 min read

Arslan Sabir

Arslan Sabir

75 Followers

Security is just an illusion

Following
  • Hussain

    Hussain

  • InfoSec Write-ups

    InfoSec Write-ups

  • D-jango

    D-jango

  • Syed Hasan

    Syed Hasan

  • System Weakness

    System Weakness

See all (7)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams