Alparslan Akyıldız academyAWS Pentest Series Privilige Escalation over IAM (assumerole)In this part of the blog series we will examine the IAM privilige escalation by using assumerole. Before we start I want to give you some…6 min read·Jun 20, 2023--1--1
Alparslan Akyıldız academyCLOUD AWS PENTEST SERIES IAM ENUMERATIONIAM (Identity and Access Management) is an essential aspect of securing your AWS (Amazon Web Services) infrastructure. It helps you control…5 min read·Jun 13, 2023--2--2
Alparslan Akyıldız academyAWS Cloud Pentesting NotesAWS GOAT PART 1 Solution7 min read·May 7, 2023----
Alparslan Akyıldız academyCloud Walktrough Part 1Nowadays I have started learning and practicing the AWS pentesting issues. So I have already solved a challenge is called flaws.cloud and I…4 min read·May 2, 2023----
Alparslan Akyıldız academyEXPLOIT DEVELOPMENT PART 4MEMORY BASED OVERFLOW THEORY AND VARIETIES12 min read·Feb 15, 2023----
Alparslan Akyıldız academyMALICIOUS OFFICE DOCUMENT ANALYSISIn this blog post enrty I analayzed a malicious word document and I use deobfuscation and decoding methods for analysing malicious…4 min read·Mar 29, 2021----
Alparslan Akyıldız academyANALYSIS TECHNIQUES FOR MALWARES WHICH USE HTTPSHello, in this blog post entry I write about malwares which uses https traffic for communication with c2 analysis techniques. We can use…4 min read·Mar 25, 2021----
Alparslan Akyıldız academyFrom Network Forensic To Shellcode AnalysisHello all, in this article I will share an experience about malware analysis in a lab simulation network. Assume that you set up a SOC and…5 min read·Mar 24, 2021----
Alparslan Akyıldız academyVIRUS TOTAL INTELLIGENCE DORKSHello friends. 4 mounths ago I send an email to VT developer team, and I asked them a VirusTotal Intelligence account for using it my…3 min read·Dec 10, 2020----
Alparslan Akyıldız academyOffensive Defence Techniques In Cyber Security, CounterHacking Methods For Cyber Threat…Hello firends, it’s been a long time since I wrote a blog, today I mention about Counter Hacking Methods for Cyber Threat Intelligence…6 min read·Dec 2, 2020----