Shells
Want to take your remote system control to the next level? A reverse shell is your ticket to direct shell
Blackcat Malvertising
In this experiment, we recreate how BlackCat’s new malvertising campaign is used to deliver malicious payloads. BlackCat Ransomware: Don’t Get
Browser in the Browser
This is another experiment based off a phishing method i heard about a few months back. The phishing page makes
Bloodhounds and Mimikatz
In this post we will follow the TryHackMe room Post-Exploitation Basics. This room takes us through some techniques red-teamers and APTs
Forensics in the Clouds
Forensics is very well understood and practiced by CIRTs in on-prem environments but what happens when DFIR needs to be
Incident Response in Azure AD
I’m using this post as a notepad for the SANS Cyber Defense Summit talk based on Monitoring and Incident Response
Tiredbot
Tiredbot is designed to be used for tabletop exercises. This program is not malicious however it may execute malicious behaviour.
internet of things
The Internet of Things (IoT) is rapidly expanding, connecting a wide range of devices to the internet, from smart home