halil deniz

@halildeniz
34 Followers
7 Following
414 Posts

What is NetBIOS and SMB Exploitation Techniques: A Practical Guide

In this article, I cover key exploitation techniques, real-world attack scenarios, and how to secure these services effectively.

https://denizhalil.com/2026/01/15/netbios-smb-exploitation-techniques-guide/

#CyberSecurity #SMB #NetBIOS #NetworkSecurity #ActiveDirectory #RedTeam #BlueTeam #Pentesting #InfoSec #WindowsSecurity #EthicalHacking #ITSecurity #DenizHalil

What is SNMP Security and Exploitation: A Comprehensive Guide

In this article, I cover how SNMP exploitation works, common vulnerabilities, and how to properly secure it.
https://denizhalil.com/2026/01/21/snmp-security-exploitation-guide

#CyberSecurity #SNMP #NetworkSecurity #InfoSec #InfrastructureSecurity #BlueTeam #RedTeam #Pentesting #ITSecurity #SecurityEngineering #DenizHalil

What is Web Cache Poisoning Attack and Defense: A Comprehensive Guide

In this article, I explain how the attack works, common vectors, and practical prevention technique
https://denizhalil.com/2026/01/26/web-cache-poisoning-attacks-prevention-guide/

#CyberSecurity #WebSecurity #CachePoisoning #AppSec #OWASP #InfoSec #Pentesting #RedTeam #BlueTeam #HTTP

SSH Tunneling and Port Forwarding Techniques: A Comprehensive Guide

In this article, I cover:
* How SSH tunneling works under the hood
* Local, remote, and dynamic port forwarding techniques
* Real-world use cases (databases, internal services, pivoting)
* Security risks and hardening recommendations

https://denizhalil.com/2026/02/02/ssh-tunneling-port-forwarding-guide/

#CyberSecurity #sshtunneling #portforwarding #NetworkSecurity #Linux #RedTeam #BlueTeam #Pentesting #InfoSec #securityengineering #EthicalHacking #ITSecurity

Subdomain Takeover Vulnerabilities and Prevention

In this article, I cover:
* How subdomain takeover vulnerabilities occur
* Real-world exploitation scenarios
Reconnaissance and detection techniques
* Practical prevention and DNS hygiene strategies

https://denizhalil.com/2026/02/16/subdomain-takeover-vulnerabilities-prevention/

#CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking

What is Port Knocking Implementation and Security: A Comprehensive Guide - DenizHalil - Professional Cybersecurity Consulting and Penetration Testing

Learn everything about port knocking implementation, security risks, attack and defense strategies, and best practices. This comprehensive guide covers how port knocking protects your network and how to deploy it securely against modern threats.

DenizHalil - Professional Cybersecurity Consulting and Penetration Testing

What is DCSync Attack and Mimikatz Usage in Active Directory

One of the most critical attacks in Active Directory environments, DCSync, allows attackers to impersonate a Domain Controller and extract password hashes through replication abuse.

#CyberSecurity #ActiveDirectory #DCSync #RedTeam #BlueTeam #InfoSec #Pentesting #SOC #ThreatDetection #WindowsSecurity #EthicalHacking #ITSecurity #NetworkSecurity #SecurityOperations #DenizHalil

https://denizhalil.com/2026/03/27/dcsync-attack-active-directory-guide/

What is DCSync Attack and Mimikatz Usage in Active Directory - DenizHalil - Professional Cybersecurity Consulting and Penetration Testing

Learn how DCSync attacks exploit Active Directory replication to steal credentials, how adversaries use Mimikatz, and the best ways to detect and prevent DCSync attacks in 2025. Essential reading for cybersecurity professionals.

DenizHalil - Professional Cybersecurity Consulting and Penetration Testing
What is Pretexting Attack in Cyber Security: Creating Believable Scenarios - DenizHalil - Professional Cybersecurity Consulting and Penetration Testing

Learn how pretexting attacks work in cybersecurity. Discover how attackers create believable scenarios, real examples, and defense strategies against social engineering threats in 2025.

DenizHalil - Professional Cybersecurity Consulting and Penetration Testing
Termux Commands Cheat Sheet: The Complete 2025 Guide for Android - DenizHalil - Professional Cybersecurity Consulting and Penetration Testing

Master Termux on Android with this updated 2025 cheat sheet. Learn essential Termux commands for package management, file operations, network tools, and ethical hacking — all in one complete guide for mobile Linux users.

DenizHalil - Professional Cybersecurity Consulting and Penetration Testing

Hello everyone.

In today's article, we're taking a detailed look at the File and Hash Threat Intel TryHackMe Walkthrough.

https://denizhalil.com/2025/08/23/file-hash-threat-intel-tryhackme-walkthrough/

File and Hash Threat Intel TryHackMe Walkthrough for SOC Analysts

Beginner-friendly TryHackMe walkthrough for SOC analysts. Learn file and hash threat intelligence, malware detection, sandboxing, and MITRE ATT&CK techniques for real-world SOC workflows.

DenizHalil - Professional Cybersecurity Consulting and Penetration Testing