Akash SarodePentesting with PowershellWindows Powershell is Command-line shell and scripting language designed for system administrators to automate the administration of…Sep 20, 2020Sep 20, 2020
Akash SarodePowershell Simplified — Part 2In the first part, we discussed about how to get started with Windows Powershell. In this part, let’s move ahead with our simplification…Feb 12, 2020Feb 12, 2020
Akash SarodePowershell Simplified — Part 1Windows PowerShell is a Windows command-line shell created to simplify administration of various Microsoft products. Powershell, as the…Feb 9, 2020Feb 9, 2020
Akash SarodeWiFi Kung Fu — Wireless HackingWireless, as the name suggest is without any wired connection, everything in the air. Wireless hacking is the most common way by which an…Feb 9, 2020Feb 9, 2020
Akash SarodeMalware Analysis — Part 2In the first part, we discussed about basic Static Malware analysis. In this part, let’s understand how to perform dynamic analysis.Jun 28, 2019Jun 28, 2019
Akash SarodeMalware Analysis — Part 1Malware, as the name indicates is Malicious software which tries to perform harmful activities on the system. The after effects may cause…Jun 28, 2019Jun 28, 2019
Akash SarodeMITRE ATT&CK MagicIn the field of Cybersecurity, attacks and threats play an important part and the day-to-day job of cyber security professional is to…Jun 25, 2019Jun 25, 2019
Akash SarodeCyber Security AnalyticsCyber Security Analytics is the process of applying analytics to billions to logs which are collected from various IT infrastructure…Jun 25, 2019Jun 25, 2019