@husey4n6 Profile picture

Hüseyin Kaplan

@husey4n6

🕵️‍♂️🏴󠁭󠁥󠀲󠀳󠁿Digital Forensic Engineer | CyberSecurity | AdliBilisim | CTI | #linux #Writeup

Joined March 2013
Similar User
Abdullah 🇹🇷 photo

@bdullahC

Erdoğan Yoksul photo

@eredot_pkfr

#./Burak photo

@_d4rkbrain

Harun ERDEM photo

@_erdemss_

Just Hunt photo

@MBerkaySoylu

Nadeem Elnabawy photo

@Nedrian0

Korcan photo

@korcankaraokcu

Mazlum BAYDAR photo

@baydarmazlum

erto photo

@baranertemir1

Can Umay photo

@canumaydev

Wedeploy Technologies photo

@wedply

Zu photo

@zul3yh

Alexandre photo

@AlexandreCyber

Hüseyin Kaplan Reposted

Free Offensive Security Notes (OSCP, OSWE, OSEP, OSED) OSCP NOTES AD: drive.google.com/file/d/14jirVK… OSCP Notes : drive.google.com/file/d/1eYUaea… OSWE Notes: drive.google.com/file/d/1KIc_qs… OSEP Notes: drive.google.com/file/d/1L9mfwf… OSED Notes: drive.google.com/file/d/1_mPHr3… #oscp #osed #oswe #osep #osce³

's tweet image. Free Offensive Security Notes (OSCP, OSWE, OSEP, OSED)

OSCP NOTES AD:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/escUYCzOhz">drive.google.com/file/d/14jirVK…</a>

OSCP Notes :
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/z0XIos7st5">drive.google.com/file/d/1eYUaea…</a>

OSWE Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/49kfdqQDMd">drive.google.com/file/d/1KIc_qs…</a>

OSEP Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/bsJlBNBO5S">drive.google.com/file/d/1L9mfwf…</a>

OSED Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/tFW3X84T6Y">drive.google.com/file/d/1_mPHr3…</a>

#oscp #osed #oswe #osep #osce³…
's tweet image. Free Offensive Security Notes (OSCP, OSWE, OSEP, OSED)

OSCP NOTES AD:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/escUYCzOhz">drive.google.com/file/d/14jirVK…</a>

OSCP Notes :
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/z0XIos7st5">drive.google.com/file/d/1eYUaea…</a>

OSWE Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/49kfdqQDMd">drive.google.com/file/d/1KIc_qs…</a>

OSEP Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/bsJlBNBO5S">drive.google.com/file/d/1L9mfwf…</a>

OSED Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/tFW3X84T6Y">drive.google.com/file/d/1_mPHr3…</a>

#oscp #osed #oswe #osep #osce³…
's tweet image. Free Offensive Security Notes (OSCP, OSWE, OSEP, OSED)

OSCP NOTES AD:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/escUYCzOhz">drive.google.com/file/d/14jirVK…</a>

OSCP Notes :
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/z0XIos7st5">drive.google.com/file/d/1eYUaea…</a>

OSWE Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/49kfdqQDMd">drive.google.com/file/d/1KIc_qs…</a>

OSEP Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/bsJlBNBO5S">drive.google.com/file/d/1L9mfwf…</a>

OSED Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/tFW3X84T6Y">drive.google.com/file/d/1_mPHr3…</a>

#oscp #osed #oswe #osep #osce³…
's tweet image. Free Offensive Security Notes (OSCP, OSWE, OSEP, OSED)

OSCP NOTES AD:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/escUYCzOhz">drive.google.com/file/d/14jirVK…</a>

OSCP Notes :
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/z0XIos7st5">drive.google.com/file/d/1eYUaea…</a>

OSWE Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/49kfdqQDMd">drive.google.com/file/d/1KIc_qs…</a>

OSEP Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/bsJlBNBO5S">drive.google.com/file/d/1L9mfwf…</a>

OSED Notes:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/tFW3X84T6Y">drive.google.com/file/d/1_mPHr3…</a>

#oscp #osed #oswe #osep #osce³…

Hüseyin Kaplan Reposted

Popular SharpHound collection methods. All → Very large volume of LDAP/Kerberos traffic to DC. SMB to many systems. ExcludeDCs → Small # of conns to DC. SMB to many systems. Stealth → Small # of conns to DC. SMB to select systems. #ThreatHunting #DFIR


Hüseyin Kaplan Reposted

Windows Privileges Cheat Sheet 🔴⚫️Full HD Image: github.com/Ignitetechnolo… #infosec #cybersecurity #hacking #pentesting

Anastasis_King's tweet image. Windows Privileges Cheat Sheet

🔴⚫️Full HD Image: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/mGR3OWgGR1">github.com/Ignitetechnolo…</a> 

#infosec #cybersecurity #hacking #pentesting

Hüseyin Kaplan Reposted

External Devices usage #DFIR #Forensics #SANS-Poster

Maboalenen's tweet image. External Devices usage #DFIR #Forensics 
#SANS-Poster

Hüseyin Kaplan Reposted

#PCAP file analysis for #EMOTET #Malware using #OpenSource tool #arkime soon InshAllah will be added to #ELK_DFIR_VM, Network #Forensics #DFIR

Maboalenen's tweet image. #PCAP file analysis for #EMOTET #Malware using #OpenSource tool #arkime soon InshAllah will be added to #ELK_DFIR_VM, Network #Forensics #DFIR
Maboalenen's tweet image. #PCAP file analysis for #EMOTET #Malware using #OpenSource tool #arkime soon InshAllah will be added to #ELK_DFIR_VM, Network #Forensics #DFIR
Maboalenen's tweet image. #PCAP file analysis for #EMOTET #Malware using #OpenSource tool #arkime soon InshAllah will be added to #ELK_DFIR_VM, Network #Forensics #DFIR

Hüseyin Kaplan Reposted

Apple TV 4 with iOS 14.7. Jailbreak with @checkra1n Full file system with @ElcomSoft and @MagnetForensics Processing with @AlexisBrignoni iLEAPP and @iamevltwin APOLLO Nice :)

mattiaep's tweet image. Apple TV 4 with iOS 14.7.
Jailbreak with @checkra1n 
Full file system with @ElcomSoft and @MagnetForensics 
Processing with @AlexisBrignoni iLEAPP and @iamevltwin APOLLO
Nice :)
mattiaep's tweet image. Apple TV 4 with iOS 14.7.
Jailbreak with @checkra1n 
Full file system with @ElcomSoft and @MagnetForensics 
Processing with @AlexisBrignoni iLEAPP and @iamevltwin APOLLO
Nice :)
mattiaep's tweet image. Apple TV 4 with iOS 14.7.
Jailbreak with @checkra1n 
Full file system with @ElcomSoft and @MagnetForensics 
Processing with @AlexisBrignoni iLEAPP and @iamevltwin APOLLO
Nice :)
mattiaep's tweet image. Apple TV 4 with iOS 14.7.
Jailbreak with @checkra1n 
Full file system with @ElcomSoft and @MagnetForensics 
Processing with @AlexisBrignoni iLEAPP and @iamevltwin APOLLO
Nice :)

Hüseyin Kaplan Reposted

Strange PPT maldoc with low detection rates since 2022-02-02. MD5: c0060c0741833af67121390922c44f91 PPT file>wscript.exe>powershell.exe>rundll32.exe [+]Exec wscript when user moves mouse [+]Wscript exec powershell [+]PS download the XORed DLL. [+]Exec it using rundll32.exe

doc_guard's tweet image. Strange PPT maldoc with low detection rates since 2022-02-02. 

MD5: c0060c0741833af67121390922c44f91

PPT file&gt;wscript.exe&gt;powershell.exe&gt;rundll32.exe

[+]Exec wscript when user moves mouse
[+]Wscript exec powershell
[+]PS download the XORed DLL. 
[+]Exec it using rundll32.exe

Hüseyin Kaplan Reposted

Day 6 #100DaysOfSigma How to possibly catch a zero day on a web server, look for suspicious children from the server process. Sigma: Shells Spawned by Web Servers github.com/SigmaHQ/sigma/… NSA recommended child process list to baseline: media.defense.gov/2020/Jun/09/20… Happy Huntin'

SecurePeacock's tweet image. Day 6 #100DaysOfSigma How to possibly catch a zero day on a web server, look for suspicious children from the server process. 

Sigma: Shells Spawned by Web Servers
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/iLNe77OJW5">github.com/SigmaHQ/sigma/…</a>

NSA recommended child process list to baseline:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/yYmW7pNKBy">media.defense.gov/2020/Jun/09/20…</a>

Happy Huntin'

Hüseyin Kaplan Reposted

SOLIDBIT Ransomware Note:

BushidoToken's tweet image. SOLIDBIT Ransomware Note:

Thanks to @BushidoToken for the samples, I share the Yara rules for the ransomware Solidbit, Darky Lock, Lockbit Black, Maui. The samples are available on Bazaar. github.com/StrangerealInt…



Hüseyin Kaplan Reposted

#DFIR @DFRWS recently published some research I worked on about iOS settings for: 📱⏱🔒Display Auto-Lock 📱⏱🔐Require Passcode dfir.pubpub.org/pub/khnqi0ff Additional iOS 15 details can be found via by blog: theforensicscooter.com/2021/09/05/ios…


Hüseyin Kaplan Reposted

Active Directory "WriteOwner" DACL abuse, now in Python 🐍 github.com/SecureAuthCorp… And icymi, "WriteDACL" abuse, also in Python now 🐍 github.com/SecureAuthCorp… One DACL abuse is left implementing, "Logon script"

_nwodtuhs's tweet image. Active Directory "WriteOwner" DACL abuse, now in Python 🐍

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/waU2eWdfPW">github.com/SecureAuthCorp…</a>

And icymi, "WriteDACL" abuse, also in Python now 🐍

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/nQGZy1dnbR">github.com/SecureAuthCorp…</a>

One DACL abuse is left implementing, "Logon script"

Hüseyin Kaplan Reposted

Best search🔍engines for Pentesters and Security Professionals. → Shodan .io → Censys .io → Hunter .io → ZoomEye .org → WiGLE .net → PublicWWW .com → Pulsedive .com → intelx .io → reposify .com → viz. greynoise .io Which one is your favourite?😇


Hüseyin Kaplan Reposted

Some time ago, I have published the tool allowing you to craft a token containing TrustedInstaller. Today, the Mk2 version appeared: no psexec.exe required, less talkative and with a bit cleaner code. The C source code and the compiled EXE, as usual: github.com/gtworek/PSBits…

0gtweet's tweet image. Some time ago, I have published the tool allowing you to craft a token containing TrustedInstaller. Today, the Mk2 version appeared: no psexec.exe required, less talkative and with a bit cleaner code. 
The C source code and the compiled EXE, as usual: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/Ufb2x1HCdo">github.com/gtworek/PSBits…</a>

Hüseyin Kaplan Reposted

sss.lunizz.com icin bulut uzerine bir kaynak derliyorum, onemli youtube videolarini ve turkce alt yazili olanlari topladim. bildiginiz guzel, turkce veya turkce alt yazi eklenebilen ucretsiz kaynaklari listelermisiniz? ekleyelim.. tesekkurler, simdiden.


Hüseyin Kaplan Reposted

Log4j Exploitation Detection Rule gist.github.com/Neo23x0/e4c8b0… #CyberSecurity #log4j


Hüseyin Kaplan Reposted

Amazon’un CEO’su Jeff Bezos'un telefonun hacklenmesi olayını duymayanınız kalmamıştır diye düşünüyorum.Bu telefonun(iPhone) forensics incelemesini FTI Consulting firması yapmış.Hazırladıkları raporu merak ediyorsanız aşağıdaki linkten indirebilirsiniz. s3.documentcloud.org/documents/6668…


Loading...

Something went wrong.


Something went wrong.