© All rights reserved. Cyber Struggle 2022
Cyber Struggle Cyber Struggle
  • Company
    • About Us
    • CS Internals
    • CS Manifesto
    • Open Letter for Ranger Grads
    • Careers
    • Press and Media
    • GDPR Notification
    • Contact Us
  • Products
    • S-46 Platform
  • Certifications
    • Ranger Certification
      • Ranger Certification Details
      • Ranger Testimonials
    • Aegis Certification
      • Aegis Certification
      • Aegis Testimonials
    • Contemprorary Certifications
      • Cyber Struggle Tactical Pistol Operator
  • For Corporates
  • Resources
    • Articles
    • Threat Reports
    • Tools
    • Announcements
  • Community
    • Community Programs
      • Ribbon Program
    • Delta Group
0
Cyber Struggle
Members
  • Alp Onaran
  • Robin Dimyan
  • Hossam Hamed
  • Kubilay Onur Gungor
Prospects
  • Nurgul Cakoglu

Cyber Struggle

Articles

COM Hijacking for Persistence
Articles Delta Group
14 December 2021

COM Hijacking for Persistence

COM Object? The Microsoft Component Object Model (COM) is an interface standard that allows the software components to interact and...
0
Ratelimit Bypass Tool: Whitepass
Announcements Articles Delta Group
17 September 2020

Ratelimit Bypass Tool: Whitepass

Cyber Struggle Delta Team has developed a tool to bypass Whitelist/Ratelimit Implementations in Web Applications/APIs Main Features Parsing Requests from burp-suite...
0
Credential Dumping Tool: Chalumeau
Announcements Articles Delta Group
22 July 2020

Credential Dumping Tool: Chalumeau

Cyber Struggle Delta Team has developed a tool to help penetration testers and red teamers during their operations.Chalumeau is an...
0
Microsoft SMBv3 Remote Code Execution Vulnerability Overview CVE-2020-0796
Articles Delta Group
13 March 2020

Microsoft SMBv3 Remote Code Execution Vulnerability Overview CVE-2020-0796

Vulnerability description This morning, Microsoft released patches for CVE-2020-0796 SMBv3 RCE Microsoft’s advisory said a crafted SMBv3 packet could be...
0
Microsoft ATA Evasion (Over PTH, Golden Ticket)
Articles Delta Group
21 April 2020

Microsoft ATA Evasion (Over PTH, Golden Ticket)

Introduction During these quarantine times, our team focusses on creating new updated topics for courses, analyses evasion, and threat hunting...
0
Intelligence Planning
Articles Delta Group
6 February 2020

Intelligence Planning

The discipline of “Intelligence” is often assumed to be practiced only by governmental agencies. However, in the field of cybersecurity,...
0
Symantec Endpoint Protection Bypass + Meterpreter Pivoting
Articles Delta Group
3 February 2020

Symantec Endpoint Protection Bypass + Meterpreter Pivoting

Introduction In Red Teaming, it is essential to keep your tactical, mechanical skills, and operational competence updated with researches and...
0
FireEye EDR Bypassed with Basic Process Injection
Articles Delta Group
14 January 2020

FireEye EDR Bypassed with Basic Process Injection

Introduction During our SOC and Red Team researches, we like to give some time to understand the endpoints and their...
0
Citrix ADC Remote Code Execution, CVE-2019-19781
Articles Delta Group
12 January 2020

Citrix ADC Remote Code Execution, CVE-2019-19781

Introduction Last month, a critical vulnerability in Citrix ADC and Citrix Gateway was published under CVE-2019-19781. The vulnerability caught our...
0
Exploit Implicit Coercion Bugs in Node.js Applications
Articles Delta Group
13 November 2019

Exploit Implicit Coercion Bugs in Node.js Applications

Introduction Implicit type coercion conditions in dynamically typed programming languages has always lead to tricky outcomes. If you ever programmed...
0
Training Model and New Approaches
Articles Delta Group
12 November 2019

Training Model and New Approaches

In our previous article, we have mentioned the unique training methodology applied within the organization of Cyber Struggle. And in...
0
Cyber Struggle and Training Model
Articles Delta Group
12 November 2019

Cyber Struggle and Training Model

There are many free or paid training in the field of Cyber Security. The number of events and training activities...
0
Cyber Struggle and Ideal Performance State
Articles Delta Group
12 November 2019

Cyber Struggle and Ideal Performance State

Cyber Security is mostly considered as only a technical issue. It contains, however, many other parameters in addition to the...
0
Preventing IDOR in Django
Articles Delta Group
22 September 2019

Preventing IDOR in Django

Basically I got some basic internals about Django framework since most of my code reviews operations are with web applications...
0
Criminal Profiling at a Glance
Articles Delta Group
5 July 2019

Criminal Profiling at a Glance

The history of criminal profiling goes back to the first profiling study of Jack the Ripper in the 1880s. But...
0
CVE-2019-0708 Technical Analysis (RDP-RCE)
Articles Delta Group
22 May 2019

CVE-2019-0708 Technical Analysis (RDP-RCE)

Microsoft patch Tuesday this May (2019) comes with patch for critical RDP RCE Vulnerability, CVE-2019-0708 Remote Code Execution Vulnerability exists...
0
Analysis of APT37 New Year Attack
Articles Delta Group
20 January 2019

Analysis of APT37 New Year Attack

EXECUTIVE SUMMARY This is the analysis report of a sample which is tied to a campaign conducted against South Korean...
0
Bankshot Dropper Analysis
Articles Delta Group
5 January 2019

Bankshot Dropper Analysis

Summary This is the analysis report of a malicious Word document used in a Phishing campaign targeting financial organizations and...
0
APT37 New Year Attack
Articles Delta Group
1 January 2019

APT37 New Year Attack

This is the analysis report of a sample which is tied to a campaign conducted against South Korean Unification Ministry...
0
WannaCry Dropper Analysis
Articles Delta Group
15 October 2018

WannaCry Dropper Analysis

Introduction In this article, we will perform a simple analysis of the WannaCry ransomware given to CS Ranger candidates as...
0
Serial Killers, 7 Psychological Phases and Cyber World
Articles Delta Group
8 October 2018

Serial Killers, 7 Psychological Phases and Cyber World

In 1988, psychologist Joel Norris, after 500 interviews, revealed his work based on the fact that serial killers undergo 7...
0

Certifications

About
CS Manifesto
Letter to Ranger Grads
Contact Us

About Company

Cyber Struggle Ranger
Cyber Struggle Aegis
Cyber Struggle TPO

For Corporates

Cyber Range Platform
SOC Maturity Certification
In-House SOC Mngmt
Outsource SOC Mngmt
Head Hunting Partnership

Subscribe to newsletter

cs_logo_son

© 2023 Cyber Struggle

in
F.A.Q
Support Forum
Video Tutorials

Search panel can contain any widgets and shortcodes.

Call us: 0 800 255 22 55