Baris DincerComplex Attack Types: Sample Scenarios 38In this article, we will hijack the machine in front of us with our technical knowledge and target-oriented cyber security tools. We will…Just nowJust now
Baris DincerComplex Attack Types: Sample Scenarios 37This article will be quite educational in some aspects. We will infiltrate the opposing system based on the manipulation of HTTP Header…1d ago1d ago
Baris DincerComplex Attack Types: Sample Scenarios 36In this scenario, when infiltrating the machine in front of us, this time we will focus on our instincts and coding ability as well as our…1d ago1d ago
Baris DincerComplex Attack Types: Sample Scenarios 35We are here with a new attack scenario. In this challenging scenario, we will defeat the machine in front of us by using our quick wit and…2d ago2d ago
Baris DincerComplex Attack Types: Sample Scenarios 34It’s a long journey. In this new scenario, we will use our quick wit and cyber security principles to infiltrate the machine in front of…3d ago3d ago
Baris DincerMalicious Document Analysis: Emotet Case IIIWe have previously shared two articles in the Emotet analysis series. We first discovered the working principle of this attack mechanism…4d ago4d ago
Baris DincerComplex Attack Types: Sample Scenarios 33With a new article, we will improve our penetration skills in a laboratory environment. The scenario in this lab environment includes…5d ago5d ago
Baris DincerComplex Attack Types: Sample Scenarios 32We are starting another tough fight. We are faced with a complex system again and we will defeat this system with our intelligence.6d ago6d ago
Baris DincerComplex Attack Types: Sample Scenarios 31This time, our target system is Windows and we will infiltrate the internal network and perform an attack on the Domain Controller.6d ago6d ago
Baris DincerMalicious Document Analysis IIFor educational purposes, we will subject an .exe file to digital forensic examination via REMnux in a lab environment.Jul 2Jul 2