Published inPicus SecurityThe Zerologon Vulnerability — How to Test it… Safely!by Süleyman Özarslan, PhDNov 2, 2020Nov 2, 2020
Published inPicus SecurityHow to Simulate and Detect MITRE ATT&CK T1053 Scheduled Task/Job Tachnique: A Real Command used by…by Süleyman Özarslan, PhDOct 18, 2020Oct 18, 2020
Published inPicus SecurityHow to Bypass WAFs for OS Command Injectionby Süleyman Özarslan, PhDOct 1, 2020Oct 1, 2020
Published inPicus SecurityThe Most Used Persistence Technique by Adversaries: MITRE ATT&CK T1053 Scheduled Task/Jobby Süleyman Özarslan, PhDSep 29, 2020Sep 29, 2020
Published inPicus SecurityHackers’ Favourite Scripting Languages Part 1: MITRE ATT&CK T1064 Scripting Techniqueby Süleyman Özarslan, PhDSep 21, 2020Sep 21, 2020
Published inPicus SecurityMITRE ATT&CK T1059 Command Line Interfaceby Süleyman Özarslan, PhDSep 15, 2020Sep 15, 2020
From pentesting to red teaming: Security testing solutions comparedby Armagan ZalogluAug 17, 2020Aug 17, 2020