Yua MikananaRed Team and Penetration Test - Windows Domain Active Directory for Offensive Cyber SecurityBackgroundJun 4Jun 4
Yua MikananaCyber Security — Active Directory Windows Domain Penetration TestingThe Active Directory (AD) serves as the backbone of an organization’s network, managing authentication, authorization, and directory…Nov 15, 2023Nov 15, 2023
Yua MikananaPower of Shellcode: Benefits of Shellcode and Writing One YourselfIn the ever-evolving landscape of cybersecurity, understanding the intricacies of shellcode and its execution is crucial for both defenders…Nov 13, 2023Nov 13, 2023
Yua MikananainITNEXTWindows Malware in C# — Using Github as C2In the realm of cybersecurity, Advanced Persistent Threat (APT) groups continue to evolve and adapt, often employing innovative techniques…Nov 8, 2023Nov 8, 2023
Yua MikananaIntroduction to Persistence Mechanisms in WindowsIn the ever-evolving landscape of cybersecurity, staying ahead of the curve is essential. As a cybersecurity professional, it’s my pleasure…Nov 1, 2023Nov 1, 2023
Yua MikananaUnderstanding UAC in Windows Systems: Token Security and BeyondIn today’s evolving cyber world, User Account Control (UAC) has emerged as one of the core mechanisms used by Windows systems to protect…Oct 7, 2023Oct 7, 2023
Yua MikananaHavoc C2: The Advanced Post-Exploitation Command and Control ToolkitCrafted with precision by @C5pider, Havoc emerges as a cutting-edge, adaptable post-exploitation command and control ecosystem, equipped to…Sep 26, 2023Sep 26, 2023
Yua MikananaPosition Independent Code (PIC) and Shellcode: An IntroductionIn the realm of cybersecurity, certain terminologies and concepts form the very fabric of various attack vectors and defense strategies…Sep 23, 2023Sep 23, 2023
Yua MikananaQuasar RAT: The Evolution of Open-Source MalwareIn the vast and complex landscape of cyber threats, a few tools rise above the rest due to their potency and popularity. One such tool is…Sep 21, 2023Sep 21, 2023
Yua MikananaWindows PE Binary: Structure, Sections, and Stealth TechniquesThe Windows Portable Executable (PE) format is the cornerstone of Windows executables, whether they be applications or system binaries. In…Sep 17, 2023Sep 17, 2023