Category: Cyber Security

  • How to Install Atomic Red Team, Which is an Attack Simulation Tool?

    In today’s article, I will talk about what Atomic Red Team Tool is, how to install this tool and what can be done with this tool. What Is Atomic Red Team Tool?Atomic Red Team is an open source tool used specifically for red team testing. This tool is used to test an organization’s defense mechanisms…

  • What is Helix and some example about Index Search Inside Data Lake

    Trellix Helix(formerly FireEye Helix) is Trellix’s XDR solution. It collects the logs it collects from many sources(endpoints, cloud, email, networ, data) in its own data lake and allows us to perform advanced searches on the data lake fed from these various sources. These searches can deliver the data we want among millions, even billions of…

  • CrowdStrike Prevention Policy’s Features and Assigning Policy to the Host Group

    CrowdStrike is a cybersecurity company that offers a unique approach to threat detection and response. Their cloud-native platform leverages artificial intelligence and machine learning to analyze data from endpoints, networks, and cloud environments and IOT devices in real-time, providing unparalleled visibility into potential threats. CrowdStrike’s Falcon platform also incorporates proactive threat hunting, automated remediation, and…

  • Installation of FireEye HX(currently Trellix HX)

    Endpoint detection and response (EDR) is a type of cybersecurity solution that helps organizations detect and respond to advanced threats. EDR solutions typically combine real-time monitoring of endpoints with historical data analysis to identify and prevent attacks. FireEye is a one of the most leading provider of EDR solutions. The company’s FireEye HX platform is…

  • Understanding the MITRE ATT&CK Framework and the Relationship Between MITRE and Security Products

    MITRE Attack Framework is a standard put forward by MITER Corporation to make the techniques and tactics used by threat actors to infiltrate a network, company or organization. In other words, it can be called a model used as a guide about cyber security attacks and defenses. While this model illuminates the attacker’s stages in…

  • Forming Backdoor Payload and Obtaining a Reverse Shell Using Ngrok and Metasploit Framework and How to Protect Yourself from it

    “This article was written to provide information about offensive security. However, it is strictly forbidden to misuse this information or engage in illegal activities. Please use this information only for ethical and legal activities. The author of this article cannot be held responsible for any misuse.“ The purpose of this article is to forming a…

  • Machine Learning and CyberSecurity

    What is Machine Learning? Basicly we can think of machine learning as a subset of artificial intelligence. The use of machine learning is basically to predict the output of the data to be given as input with the data at hand. Machine learning is divided into 3 categories. These are Supervised Learning, Unpuserved Learning and…