InTrendyol TechbyAlican KirazCyber Security - Incident Response Part 1: PreparationHi everyone, in this series of articles, we will cover the design, development, and incident response examples of IR Planning.The content…Apr 14, 2022Apr 14, 2022
whoamiDigital Forensics — l337 S4uc3Hello, let’s investigate malware network traffic!!!!!Mar 25, 2023Mar 25, 2023
Ankith BharadwajHunting & Detecting SMB Named Pipe Pivoting (Lateral Movement)Apr 13, 2023Apr 13, 2023
Nasreddine BencherchaliA Deep Dive Into RUNDLL32.EXEUnderstanding “rundll32.exe” command line argumentsOct 10, 20201Oct 10, 20201
Nasreddine BencherchaliWhat is the “DLLHOST.EXE” Process Actually RunningA Deep Dive Into “DLLHOST.EXE”Oct 17, 2020Oct 17, 2020
Nasreddine BencherchaliWhy Hunting For LOLBINs Is One Of The Best BetsI never played poker so don’t quote me on thatFeb 2, 20221Feb 2, 20221
InVelociraptor IRbyMike CohenVelociraptor vs. PrintNightmareHunting a Zero day!Jul 12, 2021Jul 12, 2021
InFMI Cyber Security Consulting ServicesbyFaishol HakimInvestigating Malicious Document FileMalicious Excel files have been a popular vector for delivering malware, phishing, and other types of cyberattacks. Excel files are…Apr 3, 2023Apr 3, 2023
Aman_UtkhedkarVillain C2 : Reverse Shell Obfuscation.Explore Alternative Payload Obfuscation Methods in Villain C2 for Reverse Shell Access. Using UUID to Obfuscate Payload for Improved…Apr 9, 20231Apr 9, 20231
Florian RothThe Bicycle of the Forensic AnalystI started my journey in a digital forensics lab crammed with hardware and a table with two dozen external hard drives. Each of these hard…Sep 10, 20221Sep 10, 20221