CyberY
Projects Blog About Notion

    Core Processes In Windows System

    Windows System

    This article aims to help you know and understand what normal behavior within a Windows operating system is.

    21 January 2023

    Packet drafting for IDS_IPS

    Packet Scapy IDS_IPS

    Using Scapy to generate packets that can test/trigger rule in Snort or Suricata.

    14 November 2022

    Python Evasion; Alternate Data Streams

    Python Evasion Alternate Data Streams

    Using Python for alternate data streams to hide artifacts on a system as defense evasion.

    29 July 2022

    Python Library Injection

    Python Injection

    Demonstration of how you can insert a file at the right location, you can use it to hijack Python execution.

    28 July 2022

    Hacking With PDF

    XSS Stealing Credentials RCE PDF Injection analysis

    Inspiration of how we can use PDF as an attack vector and perform multiple attacks with huge subsequences to the victim.

    02 July 2022

    Elastic-Case

    Elastic Security SIEM ELK

    A malicious double-extension file sneaked into a user inbox, which led to a full network compromise . Use your SIEM analysis skills to reveal the attack details. Lots of exciting stuff powershell, bruteforce, python, and reverse shell!.

    26 March 2022

    Copy Paste Attack

    copy-paste

    An attacker can embed a small JavaScript code it appears reasonable command but when you copy it you basically copying other malicious code.

    19 January 2022

    Splunk Use Cases

    Splunk

    More than 80 Use Cases for Splunk.

    24 November 2021

    Prevent Attack Using IPS Blade Protection

    IPS Check point Firewall

    Prevent Attack Using IPS Blade Protection

    21 November 2021
    with by Abdullah Baghuth