May AlsaifThreat Hunt with File MetadataThreat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. In large environments…4 min read·Aug 26, 2023----
May AlsaifForensic Traces of Exporting NTDSUndoubtedly, the attacker wants credentials more than anything, especially administrative ones to maintain access in the environment…8 min read·Feb 18, 2023--1--1
May AlsaifDetect Reflective DLL loadThe reflective Dynamic-Link Library (DLL) load technique is one of the most stealth attack techniques that is loading a raw binary directly…4 min read·Jun 3, 2022----