Mustafa KhanHow to Analyze a successful cyber attack: A SOC Analyst’s PerspectiveAs a Security Operations Center (SOC) analyst, responding to successful attacks is a critical part of maintaining an organization’s…1d ago11d ago1
Mustafa Khan20 Commands to Exploit Vulnerabilities Like a ProAs a seasoned penetration tester, Nmap (Network Mapper) is one of my go-to tools for network exploration and vulnerability discovery. While…3d ago3d ago
Mustafa KhanAnalyzing TLS 1.2 and TLS 1.3 from a Hacker’s PerspectiveAs cyber threats continue to evolve, the security protocols we rely on must also adapt. Transport Layer Security (TLS) has been a…5d ago5d ago
Mustafa KhanHow to guide to credentials harvesting in AD via Shadow copying | Red teaming walkthroughIn this blog post, we dive deep into the world of Active Directory (AD) compromises by focusing on a crucial method used by Red Teams —…5d ago5d ago
Mustafa KhanPublic Key Infrastructure (PKI) and Encryption MethodsIn today’s digital age, secure communication is paramount. Whether you’re browsing the internet, sending emails, or using a Virtual Private…Sep 25Sep 25
Mustafa KhanStep-by-Step Guide: Install and Configure a Web Server with Ansible (Nginx + PHP)In today’s DevOps environment, automating server configuration is crucial for efficient deployment. Ansible is a powerful tool that…Sep 25Sep 25
Mustafa KhanA Deep Dive into Attacks on TLS: Understanding TLS 1.2 and TLS 1.3 from a Hacker’s PerspectiveTransport Layer Security (TLS) is a cryptographic protocol designed to provide secure communication over a computer network. Despite its…Sep 24Sep 24
Mustafa KhanHow to use CMD commands for penetration testing: A recipe-based guide for red team operationsAs a penetration tester or IT support, the ability to navigate and exploit Windows environments using advanced CMD (Command Prompt)…Sep 241Sep 241
Mustafa KhanHow to Defend against advance windows attacksWindows environments are a prime target for attackers due to their widespread use in both corporate and personal networks. Attackers use…Sep 24Sep 24