Category: Attacking

Categories
Attacking Cyber Security News

How to Build Home Lab for Spring4Shell Exploit

Recently we heard an exploit about Spring4Shell like everyone else. We quickly built an incident on LetsDefend about it. Now, we are explaining how you can setup up a home lab yourself. Requirements: Vulnerable app Spring4Shell exploit Docker Stages: Build a vulnerable app Preparation for attack Exploitation By the way, we have already built anRead More

Categories
Attacking Detection News

How to Create Home Lab for Log4j Exploit

Log4j RCE vulnerability is a popular vulnerability that everyone has probably heard of recently. For those wondering how the exploit of this vulnerability works and for those who want to test in a home environment, we will show you how to quickly set up a vulnerable lab for blue team members. Not much technical detailsRead More

Categories
Attacking Detection

How to Build Your Own Cybersecurity Test Lab?

There are 3 main requirements to create a cyber security lab environment. These are: Test environment Attack simulation Detection tools In this article, we have listed free tools / resources that you can use to create your own lab environment. Additionally, if you are looking for a blue team online lab, you can visit letsdefend.ioRead More

Categories
Attacking Detection

Attacking SIEM with Fake Logs

In order to ensure to cyber security of an organization, the logs of the systems it owns must be collected, analyzed and repeated continuously. For provide the continuous of the process, monitoring systems can be installed. The fact that what is happening inside is being followed reduces the attack area of ​​the attackers. But itRead More