Alan vQUANTUM RANSOMWARE : DFIR Report sumHi guys , This blog is regarding the summary report about the Quantum ransomware . In this blog you’ll be going through the attack cycle…Jul 8Jul 8
Alan vALERT IDEAS BASED ON MITRE FRAMEWORKhey guys i am back with the blog , this blog includes some detection rules made by the MITRE ATT&CK. i have made 5 detection rule made by…Jun 11Jun 11
Alan vCredential Access Detection Strategies Using MITRE ATT&CK Framehi guys i am back with new blog, this blog regards the test cases using the MITRE ATT&CK framework. this is details detection method that…Jun 11Jun 11
Alan vEMAIL ANALYSIS : INCIDENT AND RESPONSEhi guys i am back with another blog this is regarding the Email analysis. we can see that phishing is nowadays common attack , email is…May 29May 29
Alan vJANGOW MACHINE POCThe task is to find two flags in the machine. One was in the user directory and one is in the root directory. First I need to gain a ftp…May 2May 2