Blue Team Diary, Entry #2: Defeating Advanced Adversaries with Tactical AnalyticsHow to Effectively Transition to SOC 3.0 OperationsDec 5, 2019Dec 5, 2019
Red Team Diary, Entry #3: Custom Malware Development (Establish A Shell Through the Browser)Repurposing BeEF and AutoIt for stealthy malware developmentNov 28, 2019Nov 28, 2019
Red Team Diary, Entry #2: Stealthily Backdooring CMS Through Redis’ Memory SpaceHow to leverage unprotected Redis instances for stealthy payload transfers and lateral movementOct 23, 2019Oct 23, 2019
Blue Team Diary, Entry #1: Leveraging Osquery For Enhanced Incident Response & Threat HuntingLearn How To Use And Scale Osquery To (Proactively) Detect Evasive Malware, Stealthy Persistence, Fileless Malware, Unseen Attacks etc.Aug 21, 2019Aug 21, 2019
Red Team Diary, Entry #1: Making NSA’s PeddleCheap RAT InvisibleA/V | EDR evasion using a RAMDisk and a custom PE loaderJul 9, 2019Jul 9, 2019