Akash Sarode Rewarded 2020 Nobel Peace Price

This is a satirical website. Don't take it Seriously. It's a joke.

2059 85626 Shares

Akash Sarode wins Nobel Peace Price for works in powershell, utilized it for penetration testing.
Windows Powershell is Command-line shell and scripting language designed for system administrators to automate the administration of windows operating system. Powershell is a very powerful utility in windows built on .Net framework, which is useful in variety of ways.
In this article, we will be looking at various ways in which powershell can be utilized for our penetration testing approach. Let’s start with directly with the use of powershell in penetration testing.
For the basics of powershell, kindly refer to my medium articles which has explained Powershell from scratch.
https://medium.com/@akash.sarode1234/powershell-simplified-part-1-1be32e5f598d
https://medium.com/@akash.sarode1234/powershell-simplified-part-2-b82dda7a11ff
Penetration testing methodology consists of below mentioned cycle:-
Image for post
Penetration testing methodology
Multiple tools are useful to carry out our penetration testing activity. …
Read more · 4 min read


Feb 12
Powershell Simplified — Part 2
In the first part, we discussed about how to get started with Windows Powershell. In this part, let’s move ahead with our simplification process of Powershell.
Invoke-WmiMethod is used to execute a wmi method. Let’s look at an example below:-
We will be using ClearEventlog method of class win32_nteventlogfile.
Image for post
Invoke-wmimethod
We have used Get-Wmiobject to get logs and then used ClearEventLog method to clear the logs. It may be useful for an attacker for clearing the tracks.
Running scripts-
Image for post
Read more · 4 min read


Feb 9
Powershell Simplified — Part 1
Windows PowerShell is a Windows command-line shell created to simplify administration of various Microsoft products. Powershell, as the name suggests is a powerful jewellery in windows, which is useful in a variety of ways. Powershell is used by both red teamer as well as blue teamer in cyber security.
In this article, we will be simplifying powershell so that even a person with no knowledge of the utility will start understanding & using powershell in its day-to-day activity. Let us start learning powershell from scratch.
Powershell can be accessed via its command line or by ISE (Integrated scripting engine)
Image for post
Powershell ISE
To start with, let’s use command to get details of all…
Read more · 4 min read
4


Feb 9
WiFi Kung Fu — Wireless Hacking
Wireless, as the name suggest is without any wired connection, everything in the air. Wireless hacking is the most common way by which an attacker can enter the enterprise/personal network and performs penetrating. Before understanding out the way to hack wifi, let us understand some basics of wireless networking and pre-requisites.
WLANs (Wireless Local area networks)can operate in 3 different frequencies:-
· 2.4 GHz (802.11b/g/n)
· 3.6 GHz (802.11y)
· 4.9/5.0 GHz (802.11a/h/j/n)
Each of these ranges is divided into multiple channels & every country has allowed channels, users and maximum power levels but we can configure wireless card to disregard these policies. …
Read more · 4 min read
9


Jun 28, 2019
Malware Analysis — Part 2
In the first part, we discussed about basic Static Malware analysis. In this part, let’s understand how to perform dynamic analysis.
For performing dynamic analysis, we need to setup virtual environment with host only networking method. Host-only networking, a feature that creates a separate private LAN between the host OS and the guest OS, is commonly used for malware analysis.
Sandboxing:- A sandbox is a security mechanism for running untrusted programs in a safe environment without fear of harming “real” systems. …
Read more · 4 min read
5


Jun 28, 2019
Malware Analysis — Part 1
Malware, as the name indicates is Malicious software which tries to perform harmful activities on the system. The after effects may cause business loss to an organization. Hence, it becomes very important to understand how a malware works.
Image for post
Analyzing a malware will help us identify the characteristic of the software and assist the forensics analysis as well. Let’s have definition for malware analysis —
“Malware analysis is the art of dissecting malware to understand how it works, how to identify it, and how to defeat or eliminate it.”
Malware analysis is of 2 types —
Static analysis — It involves examining the malware without running it. …
Read more · 5 min read
22


Jun 25, 2019
MITRE ATT&CK Magic
In the field of Cybersecurity, attacks and threats play an important part and the day-to-day job of cyber security professional is to prevent an organization from the threats. Many modern-day attacks are evolving and getting advanced day by day. Attackers have become more persistent in their approach and this results in various attacks/threats being targeted at organization. This results in data loss, breach, system compromise, business loss etc.
Entire cyber security world is divided in two type of teams — RED Team and BLUE Team. Red teamers are the people who are violent in their approach and try and attack an organization, basically an attacker/hacker. …
Read more · 5 min read
1


Jun 25, 2019
Cyber Security Analytics
Cyber Security Analytics is the process of applying analytics to billions to logs which are collected from various IT infrastructure devices to identify any kind of unusual behavior or threat.
Traditionally, for the purpose of security monitoring, SIEM has been used but SIEM doesn’t fulfill the requirements for detecting/preventing modern day attacks/APT’s. SIEM works on an alert-based approach but we need something which can be a data-driven approach. Hence, multiple security vendors are incorporating Cyber analytics in their product functioning which will address the modern threats to organization.
Let’s understand what is Analytics?
Analytics is nothing but generating some kind of pattern from data. Analytics can be Stack counting, Machine learning and much more. In Cyber analytics, we apply some kind of formula/analytic to large amount of data and generate output which plays an important role in detecting threats. Output can be in the form of graphs, pie charts, etc. Anomalies, outliers can be detected using analytical approach.

This is a satirical website. Don't take it Seriously. It's a joke.

loading Biewty

Most Popular

  1. 1

    a monkey escapes from the miami zoo and throws bananas from a tree Mario a monkey from the Miami Zoo has escaped last Friday from his cage when he escaped, he threw bananas at people from all over Los Angeles. This has led to a video called "banana rain going viral" right now this little criminal monkey is found in prison.

  2. 2

    octopus teaches math at harvard They hire octopus to teach math at harvard, the octopus is called arnold and it is said that he is paid 3000 dollars per class. here are some images