Skip to content

Ismaïl ALTAS

Portfolio & Blog

  • CategoriesExpand
    • Cyber Security
    • Software Testing
    • Web
    • Linux
  • LanguagesExpand
    • English
    • Français
    • Türkçe
  • Certificates
  • Resources
Ismaïl ALTAS
Portfolio & Blog
  • Cyber Security

    A Guide to Phishing and Malware Awareness in Your Company

    Your employees are innocent against any vichius cyber attack untill you educate them. In order to hold them responsible with their actions. Here is an internal document example to distribute and prepare your employees for some major phishing attack types and increase your company’s security posture. Introduction In today’s digital world, cyber threats like phishing…

    Read More A Guide to Phishing and Malware Awareness in Your CompanyContinue

  • Cyber Security

    Network Packet Investigation with WireShark

    Using wireshark, let’s do some hands on practice of investigating internet / network trafic. Specifically investigating IPV4 and IPV 6 Header information. I have run my wireshark Version 4.4.2 and immediately I was welcomed with a nice simple panel. The window was divided into two and the one below showd me some continuing heartbeat lines….

    Read More Network Packet Investigation with WireSharkContinue

  • Cyber Security

    Recognize roles and responsibilities during escalation

    Incidents will happen. Our role is to prevent it as best as we can but, soon or later a security incident hapens. It is just about time. A question of when not if. When it happens, our role is to keep business running smoothly. Necessary information for business continuity has to be kept in tact…

    Read More Recognize roles and responsibilities during escalationContinue

  • Cyber Security Python

    Play With Files Using Pyhton

    Managing files in Python is a fundamental skill, especially for tasks like analyzing logs, processing configuration files, or handling malware samples. Security analysts often need to manipulate files to extract information, monitor changes, or automate repetitive tasks. File Management in Python: Overview File Management Use Cases for Security Analysts 1. Analyzing Log Files Security analysts…

    Read More Play With Files Using PyhtonContinue

  • Cyber Security

    Regex – Regular Expressions

    Regular Expressions (Regex): A Detailed Explanation and Use Cases for Security Analysts Regular Expressions (Regex) are sequences of characters used for pattern matching within strings. They are a powerful tool for searching, extracting, and manipulating text data, commonly used in security operations for log analysis, detecting malicious patterns, and rule creation. Regex Basics Examples and…

    Read More Regex – Regular ExpressionsContinue

  • Cyber Security

    Wireshark VS Tcpdump

    Wireshark and tcpdump are both powerful network protocol analyzers, but they have distinct characteristics and use cases. Here are the key differences and similarities between them: Differences User Interface Wireshark offers a graphical user interface (GUI), making it more user-friendly and visually intuitive1. tcpdump, on the other hand, is a command-line interface (CLI) tool, which can…

    Read More Wireshark VS TcpdumpContinue

  • Cyber Security

    Your WiFi history is a vulnerability

    With the recent series of phone company and internet provider hacks, hackers now have a lot of customer data at their disposal. Using this information in a targeted hack is possible. Although I cannot generalize this type of attack, as a security specialist, I have to consider any attack vectors possible. And this one might…

    Read More Your WiFi history is a vulnerabilityContinue

  • Cyber Security

    How A Hackers Target Blocked By PASTA

    The PASTA (Process for Attack Simulation and Threat Analysis) threat modeling framework does not explicitly define a specific set of security controls. Instead, it provides a comprehensive methodology for identifying and analyzing threats, which then informs the selection and implementation of appropriate security controls. However, based on the PASTA methodology, we can identify several categories…

    Read More How A Hackers Target Blocked By PASTAContinue

  • Cyber Security

    The PASTA, Journey of TechGuard

    The Process for Attack Simulation and Threat Analysis (PASTA) is a comprehensive, risk-centric threat modeling framework that consists of seven stages. To illustrate this framework, let’s follow the story of TechGuard, a growing software company developing a new cloud-based financial management application. Stage 1: Define Objectives TechGuard’s leadership gathers to set clear business and security…

    Read More The PASTA, Journey of TechGuardContinue

  • Cyber Security

    SQL Injections

    SQL injection is a cybersecurity vulnerability where attackers insert malicious SQL code into application inputs to manipulate or access database information. Let’s explore the types of SQL injections and prevention methods, then illustrate these concepts through a story set in medieval Japan. Types of SQL Injection Prevention Methods The Tale of the Ninja and the…

    Read More SQL InjectionsContinue

Page navigation

1 2 3 … 8 Next PageNext

© 2025  | Ismaïl ALTAS

  • Categories
    • Cyber Security
    • Software Testing
    • Web
    • Linux
  • Languages
    • English
    • Français
    • Türkçe
  • Certificates
  • Resources
Search