Hüseyin EKŞİMalware Analysis of Crackme ChallengeI wanted to take on the challenge presented by jeFF0Falltrades and do a writeup along with it. Thanks for creating such valuable content!Jul 311Jul 311
Hüseyin EKŞİShedding a Light into the World of Linux MalwareMost of the people only knows one operating system and it is Windows, that’s actually normal if we look at the statcounter data for desktop…May 21May 21
Hüseyin EKŞİinSystem WeaknessMalware Analysis of a Emotet Word DocumentIn this blog post, I will show how to analyze a malicious Word document.Apr 15Apr 15
Hüseyin EKŞİImportant Sysmon Events to FollowWe live in a time where visibility is very important for detecting advanced threats.Mar 8Mar 8
Hüseyin EKŞİThe Challenge of February with Any.runI prepared a challenge investigation for security analysts. Used a sample from any.run Here are the questions that I want you to answer…Feb 1Feb 1
Hüseyin EKŞİMalware Analysis of PMAT-Bonus Unknown malwareI have analyzed the Bonus malware called unknown and would like to share my findings. If you have analyzed this piece of malware please…Jan 21Jan 21
Hüseyin EKŞİShellCode Analysis with ScdbgShellCode analysis is a method used in cybersecurity to understand the functionality of a shellcode. Shellcode is a small piece of code…Jan 5Jan 5
Hüseyin EKŞİMalware Analysis Challenge SillyPuttyI finished the Silly Putty Practical Malware Analysis Challenge on tcmsecurity.com and would like to share my findings.Oct 21, 2023Oct 21, 2023
Hüseyin EKŞİYour new fellow: MDR Service ProviderHi, security folks. I have been working at an MSSP for a couple of years, and while attending MDR customer meetings, I have noticed that…Jul 9, 2023Jul 9, 2023