🕹️
Ali Rodoplu
  • 👋Who am I?
  • ARTICLES
  • 🧨Offensive
    • Enum4Linux
    • How to Perform SSH Brute Force Attack and How Can We Protect Our Systems from It?
    • Dictionary Attack via HashCat
    • Credential Dumping via Pypykatz
    • Exploiting the Shellshock Vulnerability and Protecting Yourself against It
    • What is Buffer Overflow Attack and How to Obtain Reverse Shell Using Buffer Overflow Attack
    • How to Kill Microsoft Defender’s Process
    • Getting Reverse Shell with Powercat
    • Creating Backdoor payload and Obtain Reverse Shell via Ngrok and MetaSploit Framework
    • Kiterunner
  • ⚙️Defensive
    • 📺Static Analysis
      • Finding Malwares by Performing Static Analysis with PeStudio
    • 📌Dynamic Analysis
      • Find Malwares using Process Explorer
      • Find Malwares Using Sysmon
      • Malware Hunting using Procmon and Procexp
      • Linux Sysmon
    • 📀Reverse Engineering
      • ILSPY ile Zararlı bir .NET PE'sine Reverse Engineering.
  • 🔥CVE Explotation
    • CVE-2023-48795 Zafiyeti ve Bazı Mitigation Adımlarının Gerçekleştirilmesi
    • Heap Buffer Overflow in libwebp in Google Chrome - CVE-2023-4863
    • HTTP/2 ‘Rapid Reset’ DDoS atağı CVE-2023-44487
    • Exploit the Log4J Vulnerability - CVE-2021-44228
    • Exploit the WinRAR - CVE-2023-38831
  • 🔗OSINT
    • Maltego the OSINT Tool
  • 🎯Attack Simulation
    • Caldera Installation and Simulating an Attack with Caldera
    • How to Install Atomic Red Team, Which is an Attack Simulation Tool?
  • 💻Cyber Security
    • Dolandırıcıların Yeni Dolandırıcılık Yöntemlerinden biri: Youtube Reklamları
    • OWASP And OWASP Top Ten Project
    • Understanding the MITRE ATT&CK Framework and the Relationship Between MITRE and Security Products
    • Machine Learning and CyberSecurity
  • 💿Cyber Security Products
    • Trellix(FireEye)
      • Creating HX Policy And Host Set then Binding Them To Each Other
      • What is Helix and some example about Index Search Inside Data Lake
      • Installation of FireEye HX(currently Trellix HX)
    • CrowdStrike
      • CrowdStrike’s FileVantage Feature and How to Set Policy.
      • CrowdStrike Prevention Policy’s Features and Assigning Policy to the Host Group
  • 💾General
    • What is PrivateGPT and How to Install It
Powered by GitBook
On this page
  1. 💿Cyber Security Products

CrowdStrike

CrowdStrike’s FileVantage Feature and How to Set Policy.CrowdStrike Prevention Policy’s Features and Assigning Policy to the Host Group
PreviousInstallation of FireEye HX(currently Trellix HX)NextCrowdStrike’s FileVantage Feature and How to Set Policy.