Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Archives for Wasim Halani

  1. Home
  2. Author: Wasim Halani

Author: Wasim Halani

Case Studies Compromise Detection DFIR Incident Response Network Forensics

Security Analytics Using ELK

Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences […]

April 2, 2018January 21, 2025
0
Incident Response Research Tools

Hunting Phish Domains

Most organizations face a barrage of attacks every day from threat actors around the globe. Among the various vectors, attackers have found relatively high degree […]

May 4, 2017January 21, 2025
0
Research Security Testing Social Engineering Tools

Exfiltration Using Powershell & Outlook

Introduction When an attacker compromises an end-point system in an organization, he needs some sort of confirmation that: his code was executed on the targeted […]

March 1, 2016January 21, 2025
0
Compliance Laws & Regulations

PCI DSS Penetration Testing Guidance

The Payment Card Industry Security Standards Council recently released their updated Information Supplement: Penetration Testing Guidance. The guidance document was last published in 2008 under […]

April 10, 2015
0
Case Studies Research Security Testing

ATM Application Whitelisting Security Assessment

During a recent engagement, we were asked to test the security level of an application white-listing solution deployed on the Windows XP ATMs of one […]

September 22, 2014January 20, 2025
0
Case Studies Research Wireless Security

Insecure Implementation of Guest Wireless Networks

Most large organizations provide wireless facilities for their guest, which may include vendors, consultants, business associates, employees from other regions etc. Certain points should be […]

March 29, 2014January 10, 2025
0
Fundamentals Research

Disable IIS 7.5 Banner Information

Below are the steps of how to fix the banner (version information) in IIS 7.5 Install the latest version of URLScan 3.1 (http://learn.iis.net/page.aspx/726/urlscan-overview/). Select the […]

October 18, 2012January 21, 2025
1
Case Studies

Does Your DLP Implementation Keep You Awake At Night?

With the boundary-less work culture of the 21st century, organizations have started to wake up to the fact that they cannot withhold information within the […]

September 5, 2012January 10, 2025
1
Reading Tools

Info-Letter vol.2

Hi all, This month’s reading list. Make sure to check out the tools sections. Traditional Pen-testing is Dead: A frank look at the state of affairs […]

November 19, 2010January 21, 2025
0
Reading Tools

Info-Letter vol. 1

Hi all, We are starting with a monthly reading-list for people who are unable to keep up with the latest in the field of IT […]

October 18, 2010January 8, 2025
0
  • 1
  • 2

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top