Hbayram-cyberianLogsPhishing Simulation: is it so easy, yes it is…Phishing and social engineering are trending because they exploit human psychology rather than relying solely on technical hacking skills…Jul 5Jul 5
Hbayram-cyberianLogsUncovering the Threat: How Does NTFS Alternate Data Stream (ADS) Hide Embedded Malware?Alternate Data Streams (ADS) is a file attribute found only in the NTFS file system. In this system a file is composed of several…Jun 24Jun 24
Hbayram-cyberianLogsPART-2 / Exploring the Efficacy of Custom Reconnaissance on ICS/SCADA: OT Security&PentestIn the previous article, we have already discussed on how risky open port and discoverable services in public internet at OT sector. In…May 30May 30
Hbayram-cyberianLogsPART-1 / Exploring the Efficacy of Custom Scripts on ICS/SCADA: OT Security&PentestMany devices are executable without authentication. With enumeration, it can be mapped on the network to gather info such as PLC type…May 12May 12
Hbayram-cyberianLogsNetwork Simulation Lab Training: EVE-NG vs Cisco Packet TracerNetworking has a vital role in connecting devices. At this point, network simulation plays a critical role. Before establishing a physical…Jan 4Jan 4
Hbayram-cyberianLogsBeef; yes it is, something edible, but not meat: The Browser Exploitation Framework (BeEF)The Browser Exploitation Framework (BeEF) is a tool used mostly for honeypot and social engineering under the penetration testing. It uses…Jul 7, 2023Jul 7, 2023
Hbayram-cyberianLogsIDOR/Broken Access Control with BurpSuiteWhen we visit a website, web applications obtains us to access the content through objects. These objects describe the conditions for…Jun 22, 2023Jun 22, 2023
Hbayram-cyberianLogsFortigate IPsec Tunneling between Sites on EVE-NG LabHow to secure remote access to an enterprise network system? Demand for reliable and secure virtual networks is growing day by day. One of…Jun 1, 2023Jun 1, 2023
Hbayram-cyberianLogsPersistence on Windows with BackDoors (4/4)4. Windows Login screen with Sticky Keys or Utilman It is the last part of basic backdooring for persistence. In our case, we have already…May 30, 2023May 30, 2023
Hbayram-cyberianLogsPersistence on Windows with BackDoors (3/4)3. Dumping hashes and assigning admin privileges for unprivileged usersMay 19, 2023May 19, 2023