AlanvvQUANTUM RANSOMWARE : DFIR Report sumHi guys , This blog is regarding the summary report about the Quantum ransomware . In this blog you’ll be going through the attack cycle…Jul 8Jul 8
AlanvvALERT IDEAS BASED ON MITRE FRAMEWORKhey guys i am back with the blog , this blog includes some detection rules made by the MITRE ATT&CK. i have made 5 detection rule made by…Jun 11Jun 11
AlanvvCredential Access Detection Strategies Using MITRE ATT&CK Framehi guys i am back with new blog, this blog regards the test cases using the MITRE ATT&CK framework. this is details detection method that…Jun 11Jun 11
AlanvvEMAIL ANALYSIS : INCIDENT AND RESPONSEhi guys i am back with another blog this is regarding the Email analysis. we can see that phishing is nowadays common attack , email is…May 29May 29
AlanvvJANGOW MACHINE POCThe task is to find two flags in the machine. One was in the user directory and one is in the root directory. First I need to gain a ftp…May 2May 2
AlanvvSmart TV Hacking : Using Android Debugging BridgeHello there, in this blog i am gonna walk you through sneaking into smart TV using a android debug bridge. Android TV has a developer…Mar 16Mar 16