PinnedAli SeferPractical Malicious Office Document AnalysisIn the digital age, Office documents such as Word, Excel, and PowerPoint files are ubiquitous in both personal and professional…Jul 26Jul 26
PinnedAli SeferThreat Hunting with VelociraptorCybersecurity threats are constantly evolving and becoming more complex. Effective detection and analysis of these threats play a critical…Jul 22Jul 22
PinnedAli SeferWindows | Active Directory Security 101As Windows operating system users, we understand the importance of keeping our computers safe and secure. In this blog post, we will…Apr 5Apr 5
Ali SeferNetworkMinerNetwork Forensic is a discipline that involves the detailed examination and analysis of events occurring in computer networks. This…Apr 26Apr 26
Ali SeferSimple Network Analysis with WiresharkIn the era of modern information technologies, cybersecurity has become an indispensable part of networks. This article will focus on the…Apr 2Apr 2
Ali SeferSimple Memory Analysis with Volatility2/3Exploring Memory Analysis Techniques with Volatility2/3: Unveiling the Intricacies of Digital ForensicsMar 26Mar 26
Ali SeferT-Pot Installation and UseThe T-Pot Honeypot framework is a multi-use Honeypot framework that deploys custom Docker containers to a set of protocols that emulate…Aug 18, 20231Aug 18, 20231
Ali SeferPrivilege Escalation with IAM Service on Amazon AWS Systems Through an ExampleAmazon Web Services (AWS) cloud platform has become the backbone of countless modern applications, providing scalable and reliable…Aug 5, 2023Aug 5, 2023
Ali SeferPersistence in Active Directory Structures — 1Attackers try to ensure persistence in a system after they have taken over a system and successfully escalated authorization. The main…Aug 3, 2023Aug 3, 2023