The landscape of web security underwent a significant transformation with the advent of OWASP. OWASP is an organization formed by a collective of passionate developers, security experts, and technology enthusiasts. Its primary objective is to fortify web applications against vulnerabilities and bolster the overall security posture of the web against cyber threats. Established in 2001, […]
Note: First of all, the tool I use below is prevented by defender. In order to bring this tool to windows, you must obfuscate the relevant code or have it marked as allow with social engineering. Prerequisites In this article, I will explain how to bypass (disable) Microsoft Defender. First of all, if we want […]
Powercat is a PowerShell-based tool that provides the functionality of Netcat, a popular network utility. It can be used to create reverse shells, transfer files, and perform other network-related tasks. Powercat is often used by penetration testers and security researchers to test the security of networks. Now let’s talk about how to get Reverse Shell […]
In one of our previous articles, we explained How to Install HX. Now, let’s talk about how to group our endpoints, how to create our policies and how to connect these policy-hostset pairs we created. To Create Host Sets; 1- Go to Admin > Host Sets 2- Click Related Button. 3- At this point, we […]
Procmon is a Windows program that displays real-time information about all running processes and threads. It can be used to track system resources, identify performance bottlenecks, and troubleshoot deadlocks. A deadlock is a situation in which two or more processes are waiting for each other to complete an action, resulting in a system lockup. Procmon […]
Hello everyone. In this article, I am gonna talk about CrowdStrike’s FileVantage feature and how we can set a FIM rule. CrowdStrike Falcon FileVantage is a file integrity monitoring (FIM) solution that offers central visibility and deep-level contextual data around changes made to relevant files and systems across your organization.* It is a lightweight agent […]
In today’s article, I will talk about what Atomic Red Team Tool is, how to install this tool and what can be done with this tool. What Is Atomic Red Team Tool?Atomic Red Team is an open source tool used specifically for red team testing. This tool is used to test an organization’s defense mechanisms […]
Trellix Helix(formerly FireEye Helix) is Trellix’s XDR solution. It collects the logs it collects from many sources(endpoints, cloud, email, networ, data) in its own data lake and allows us to perform advanced searches on the data lake fed from these various sources. These searches can deliver the data we want among millions, even billions of […]
CrowdStrike is a cybersecurity company that offers a unique approach to threat detection and response. Their cloud-native platform leverages artificial intelligence and machine learning to analyze data from endpoints, networks, and cloud environments and IOT devices in real-time, providing unparalleled visibility into potential threats. CrowdStrike’s Falcon platform also incorporates proactive threat hunting, automated remediation, and […]
Endpoint detection and response (EDR) is a type of cybersecurity solution that helps organizations detect and respond to advanced threats. EDR solutions typically combine real-time monitoring of endpoints with historical data analysis to identify and prevent attacks. FireEye is a one of the most leading provider of EDR solutions. The company’s FireEye HX platform is […]