Join the Webinar | Strong Protection Against Cyber Threats

Persistence - WMI Event Subscription

  Persistence - WMI Event Subscription WMI (Windows Management Instrumentation) enables system management to occur locally and remotely. WMI can be used to achieve a variety of situations such as persistence, lateral movement, code execution, and command and control (C2). The fact that WMI is available in almost all Windows operating systems is a threat to attackers.

What is PowerShell Hardening?

PowerShell Hardening What is PowerShell? PowerShell is an embedded scripting language and a command-line executor developed by Microsoft to provide a better interface for system administrators to simplify and automate administrative tasks. It can be found everywhere in Microsoft Windows systems and

Robotic Process Automation

Robotic Process Automation RPA or Robotic Process Automation is a software application of manual and repetitive tasks performed by humans using digital systems; It is carried out by imitating it through a robot. RPA is a process that automates business processes quickly and easily and eliminates human intervention.

Business Logic Weaknesses

Business Logic Weaknesses What is Business Logic? Business Logic is translated from English to Turkish as Business Logic. The rules for processing and interpreting the data of an existing application are called business logic. How Do Business Logic Vulnerabilities Occur? Business logic vulnerabilities, like most other vulnerabilities, are caused by the user.

What is Mimikatz and SSP?

What are Mimikatz and SSP? What is Mimikatz? "What is Mimikatz?" Before answering the question, it is necessary to know how to log in to Windows systems. When we turn on the system, an application called "lsass.exe" is activated to verify our password and username information while logging in. This application systems

1 2 3 4 5 12