Mehmet Ergene's Avatar

Mehmet Ergene

@cyb3rmonk.bsky.social

https://academy.bluraven.io Threat Hunting & Research, Detection Engineering | Microsoft Security MVP #KQL #DFIR #DataScience All is one. Opinions are my own http://posts.bluraven.io https://github.com/Cyb3r-Monk/Threat-Hunting-and-Detection

1,378 Followers  |  260 Following  |  63 Posts  |  Joined: 26.04.2023  |  2.2649

Latest posts by cyb3rmonk.bsky.social on Bluesky

Check out my new blog on nested app authentication.

13.08.2025 16:43 โ€” ๐Ÿ‘ 6    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Querying Azure Resource Graph Without Limits Usingย KQL Learn how to query Azure Resource Graph using KQL without hitting limits.

๐Ÿ›‘ Azure Resource Graph limits number of results to 1000 when queried from Sentinel or Defender XDR using KQL.

There is a little trick that lets you bypass these limits.๐Ÿค“

๐Ÿ”—
academy.bluraven.io/blog/queryin...

#KQL #MicrosoftSentinel #AzureResourceGraph #DefenderXDR

24.06.2025 14:33 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Announcing The Homelab Almanac: Version 3.0 The best guide to homelabs just got a lot betterโ€”and bigger.

Hello, friends! I'm thrilled to announce that The Homelab Almanac, v3.0 has officially launched! There is a **ton** of new stuff in this version, including:

- Proper DNS
- PKI
- Automatic signed certificates
- New secrets management
- Proxmox clustering
- Cloud integration

07.06.2025 04:58 โ€” ๐Ÿ‘ 40    ๐Ÿ” 16    ๐Ÿ’ฌ 4    ๐Ÿ“Œ 2
Preview
Detecting BadSuccessor: Shorcut to Domain Admin Detect BadSuccessor attacks exploiting dMSA in Windows Server 2025. Learn key detection methods and auditing configurations.

๐Ÿšจ BadSuccessor = Bad OPSEC

With the right audit config, it's pretty easy to detect BadSuccessor.

academy.bluraven.io/blog/detecti...

#ThreatHunting #DetectionEngineering #ThreatDetection
#BadSuccessor

03.06.2025 14:50 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Detecting Vulnerable Drivers (a.k.a. LOLDrivers) the Right Way Detect vulnerable Windows drivers in MDE the right way using KQL and LOLDrivers.io. Avoid common query mistakes and boost detection accuracy.

This blog is a little bitter, but it's what it is๐Ÿซ 

academy.bluraven.io/blog/detecti...

#ThreatHunting #DetectionEngineering

29.05.2025 11:36 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Detecting Vulnerable Drivers (a.k.a. LOLDrivers) the Right Way Detect vulnerable Windows drivers in MDE the right way using KQL and LOLDrivers.io. Avoid common query mistakes and boost detection accuracy.

This blog is a little bitter, but it's what it is๐Ÿซ 

academy.bluraven.io/blog/detecti...

#ThreatHunting #DetectionEngineering

29.05.2025 11:36 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Website is down?

18.05.2025 11:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐Ÿšจ Test your Lateral Movement investigation skills!

We have just added a new challenge to our FREE "Hands-On Introduction to KQL for Security Analysis" course!

You can even test your AI agents' skills ๐Ÿ˜‰

#KQL #Kusto #MicrosoftSentinel #MicrosoftDefender

academy.bluraven.io/course/intro...

19.04.2025 15:49 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Home - Blu Raven Academy Master KQL for threat hunting, detection engineering, and incident response in a hyper-realistic lab environment using real logs!

๐Ÿฃ HAPPY EASTER CAPSTONE! ๐Ÿ›ก๏ธ

My KQL courses now include a complete attack scenario to test your skills โ€” end to end.

๐ŸŽฏ Hands-on labs
๐Ÿ“‰ 20% OFF for a limited time!
Crack it open ๐Ÿ‘‡

#KQL #Kusto #ThreatHunting #DetectionEngineering #DFIR

academy.bluraven.io

18.04.2025 12:46 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐ŸŽ NEW UPDATE:

I've added a small challenge to my FREE "Hands-On Introduction to KQL for Security Analysis" course.

More will be coming soon!

#KQL #Kusto #MicrosoftDefender #MicrosoftSentinel
academy.bluraven.io/course/intro...

17.04.2025 15:31 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Introduction to KQL for Security Analysis Learn the basics of KQL to start your journey into security investigations, threat hunting, and detection engineering with hands-on experience in a hyper-realistic lab environment! Certificate of Com...

๐Ÿšจ FREE unlimited lab access to "Introduction to KQL for Security Analysis" course!

Thrilled to announce that my Intro to KQL for Security Analysis lab environment is now completely free with no time restrictions!

academy.bluraven.io/course/intro...

#KQL #Kusto #ThreatHunting #Infosec

10.04.2025 14:37 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿšจ Problem with Cyber Range/Training platforms โ“

Most range platforms and training labs provide you with all the questions to solve, hinting answers to other questions.

I've implemented a trick to hide some questions that reveal hints for other questions for a real-life experience.

Stay tuned.๐Ÿ‘€

02.04.2025 14:26 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Why Knowing How to Query is an Essential Cybersecurity Skill At its coreโ€Šโ€”โ€Šcybersecurity revolves around data.

osintteam.blog/why-knowing-...

29.03.2025 14:29 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
C2 Beaconing Detection with MDE Aggregated Report Telemetry Detecting C2 Beaconing using MDE Aggregated Report Telemetry.

๐Ÿšจ Detect C2 Beacons!

New Microsoft Defender for Endpoint telemetry provides new opportunities for threat detection!

๐Ÿ”—
academy.bluraven.io/blog/beaconi...


#ThreatHunting #DetectionEngineering #MDE

14.03.2025 14:13 โ€” ๐Ÿ‘ 8    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Advanced KQL for Threat Hunting: Window Functions โ€” Part 2 Sliding window functions are one of the powerful methods for accurate detections as they eliminate the potential false negatives. They can be used in threat hunting, detection engineering, and DFIR to...

When you group your logs by timestamp(binning) to detect threats, you probably cause false negatives. Solve it using sliding window counts!

academy.bluraven.io/blog/advance...

#KQL #ThreatHunting #DetectionEngineering

28.02.2025 15:52 โ€” ๐Ÿ‘ 8    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

It appears Microsoft quietly mitigated most of the risk of the "Intune company portal" device compliance CA bypass by restricting the scope of Azure AD graph tokens issued to this app, making them almost useless for most abuse scenarios. Thx @domchell.bsky.social for the heads up.

20.02.2025 11:08 โ€” ๐Ÿ‘ 28    ๐Ÿ” 9    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

The phishing usually happens on a managed device, though ๐Ÿค”

18.02.2025 15:28 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

I used plaintext roadtx and then used roadrecon to dump Entra ID data. I even caused sign-in failures. There isn't any CAP in this tenant. Could that be the reason? AFAIK, it doesn't affect risk identification.

15.02.2025 15:16 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿฅฒ Seems like you don't even have to use residential proxies for device code phishing for evasion. Just get a machine in one of the cloud providers' corresponding regions. ๐Ÿคทโ€โ™‚๏ธ

15.02.2025 15:15 โ€” ๐Ÿ‘ 7    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐Ÿ’™Fall in Love with Threat Hunting, Incident Response, and Detection Engineering using #KQL๐Ÿ’™
Code: VLTN30
Valid until 17.02

#ThreatHunting
academy.bluraven.io

15.02.2025 14:27 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I'm for multivariate anomaly detection approach and scoring the results. However, this scoring is not static like "if X, then score += 10".

14.02.2025 12:12 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Advanced KQL for Threat Hunting: Window Functions โ€” Part 1 Window functions are one of the powerful methods for data analysis. They can be used in threat hunting, detection engineering, and DFIR to solve complicated use cases.

Window functions do wonders!

academy.bluraven.io/blog/advance...

#ThreatHunting #KQL

14.02.2025 12:08 โ€” ๐Ÿ‘ 4    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿšจ Time to check your detection queries for MDE:

DLL load events are recorded in DeviceImageLoadEvents table, NOT DeviceEvents table. I keep seeing people sharing queries with the wrong table and even with the wrong ActionType filters.

08.02.2025 11:51 โ€” ๐Ÿ‘ 6    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Your Private Wireguard Network from Scratch Let's learn how to set up our own private network for secure self-hosted services.

Here it is: your complete guide to building a Wireguard network that doesn't require any open ports at home, and doesn't require any third-party tools. Just Wireguard, your devices, and a little elbow grease.

taggart-tech.com/wir...

30.01.2025 17:32 โ€” ๐Ÿ‘ 47    ๐Ÿ” 17    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Preview
How to Manage Dev Tunnels with Group Policies Dev Tunnels is a tunneling service that can boost your productivity when testing and debugging web apps, webhooks, APIs, and more

It seems like there is an easy way to block VS Code tunnels (Dev Tunnels) on Windows to prevent malicious usage. ๐Ÿ˜ฎ

techcommunity.microsoft.com/blog/azurede...

30.01.2025 14:40 โ€” ๐Ÿ‘ 6    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image

#LOLBAS project update:

Entries now have placeholders for paths, URLs, and more. This makes it easier to visually see what parts are "variable", and for LOLBAS API users (lolbas-project.github.io/api/) it'll be easier to use with automation.

Check it out:
โญ lolbas-project.github.io

28.01.2025 15:13 โ€” ๐Ÿ‘ 13    ๐Ÿ” 6    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Tell me a single windows logon event (network logon) that shows the IP address, Port, and if the logon has admin privileges.

27.01.2025 17:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I don't have insights into everything but I don't think so from my experience.

25.01.2025 06:53 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Detectable by Design?
We keep failing on "shift left", "secure by design", etc. to prevent malicious activities.
How about "detectable by design" approach? It's certain your product will fail on the prevention side but you could design it in a way that makes it easy to detect malicious activities.

24.01.2025 16:59 โ€” ๐Ÿ‘ 14    ๐Ÿ” 0    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 1
Preview
Mastering Log Ingestion Delay in Detection Engineering Mastering log Ingestion delay in detection engineering to avoid false positives, false negatives, and improve accuracy.

New Year, New Blog

academy.bluraven.io/blog/masteri...

#DetectionEngineering #SIEM #XDR

02.01.2025 15:31 โ€” ๐Ÿ‘ 12    ๐Ÿ” 4    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@cyb3rmonk is following 20 prominent accounts