Alparslan Akyıldız academyAWS Pentest Series Privilige Escalation over IAM (assumerole)In this part of the blog series we will examine the IAM privilige escalation by using assumerole. Before we start I want to give you some…Jun 20, 20231Jun 20, 20231
Alparslan Akyıldız academyCLOUD AWS PENTEST SERIES IAM ENUMERATIONIAM (Identity and Access Management) is an essential aspect of securing your AWS (Amazon Web Services) infrastructure. It helps you control…Jun 13, 20232Jun 13, 20232
Alparslan Akyıldız academyCloud Walktrough Part 1Nowadays I have started learning and practicing the AWS pentesting issues. So I have already solved a challenge is called flaws.cloud and I…May 2, 2023May 2, 2023
Alparslan Akyıldız academyEXPLOIT DEVELOPMENT PART 4MEMORY BASED OVERFLOW THEORY AND VARIETIESFeb 15, 2023Feb 15, 2023
Alparslan Akyıldız academyMALICIOUS OFFICE DOCUMENT ANALYSISIn this blog post enrty I analayzed a malicious word document and I use deobfuscation and decoding methods for analysing malicious…Mar 29, 2021Mar 29, 2021
Alparslan Akyıldız academyANALYSIS TECHNIQUES FOR MALWARES WHICH USE HTTPSHello, in this blog post entry I write about malwares which uses https traffic for communication with c2 analysis techniques. We can use…Mar 25, 2021Mar 25, 2021
Alparslan Akyıldız academyFrom Network Forensic To Shellcode AnalysisHello all, in this article I will share an experience about malware analysis in a lab simulation network. Assume that you set up a SOC and…Mar 24, 2021Mar 24, 2021
Alparslan Akyıldız academyVIRUS TOTAL INTELLIGENCE DORKSHello friends. 4 mounths ago I send an email to VT developer team, and I asked them a VirusTotal Intelligence account for using it my…Dec 10, 2020Dec 10, 2020
Alparslan Akyıldız academyOffensive Defence Techniques In Cyber Security, CounterHacking Methods For Cyber Threat…Hello firends, it’s been a long time since I wrote a blog, today I mention about Counter Hacking Methods for Cyber Threat Intelligence…Dec 2, 2020Dec 2, 2020