AWS Pentest Series Privilige Escalation over IAM (assumerole)In this part of the blog series we will examine the IAM privilige escalation by using assumerole. Before we start I want to give you some…Jun 20, 20231Jun 20, 20231
CLOUD AWS PENTEST SERIES IAM ENUMERATIONIAM (Identity and Access Management) is an essential aspect of securing your AWS (Amazon Web Services) infrastructure. It helps you control…Jun 13, 20232Jun 13, 20232
Cloud Walktrough Part 1Nowadays I have started learning and practicing the AWS pentesting issues. So I have already solved a challenge is called flaws.cloud and I…May 2, 2023May 2, 2023
MALICIOUS OFFICE DOCUMENT ANALYSISIn this blog post enrty I analayzed a malicious word document and I use deobfuscation and decoding methods for analysing malicious…Mar 29, 2021Mar 29, 2021
ANALYSIS TECHNIQUES FOR MALWARES WHICH USE HTTPSHello, in this blog post entry I write about malwares which uses https traffic for communication with c2 analysis techniques. We can use…Mar 25, 2021Mar 25, 2021
From Network Forensic To Shellcode AnalysisHello all, in this article I will share an experience about malware analysis in a lab simulation network. Assume that you set up a SOC and…Mar 24, 2021Mar 24, 2021
VIRUS TOTAL INTELLIGENCE DORKSHello friends. 4 mounths ago I send an email to VT developer team, and I asked them a VirusTotal Intelligence account for using it my…Dec 10, 2020Dec 10, 2020
Offensive Defence Techniques In Cyber Security, CounterHacking Methods For Cyber Threat…Hello firends, it’s been a long time since I wrote a blog, today I mention about Counter Hacking Methods for Cyber Threat Intelligence…Dec 2, 2020Dec 2, 2020