May AlsaifThreat Hunt with File MetadataThreat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. In large environments…Aug 26, 2023Aug 26, 2023
May AlsaifForensic Traces of Exporting NTDSUndoubtedly, the attacker wants credentials more than anything, especially administrative ones to maintain access in the environment…Feb 18, 20231Feb 18, 20231
May AlsaifDetect Reflective DLL loadThe reflective Dynamic-Link Library (DLL) load technique is one of the most stealth attack techniques that is loading a raw binary directly…Jun 3, 2022Jun 3, 2022