Open in app

Sign In

Write

Sign In

Jym
Jym

114 Followers

Home

About

Pinned

Windows Events — Part 3 — Disrupt Code Execution with ETW

Background First two parts with about observing process: what is it doing? Part 1 touched onWindows Process Auditing & Part 2 covered Sysmon. This sharing illustrates how to use Event Tracing for Windows to disrupt malicious Code-Execution. Some terms & concepts are based on background materials from my Cyber Security in 7 weeks series. Outline & Objectives Learn that evasions are cheap & effective against paid controls that are based on signature detection.

Cybersecurity

1 min read

Cybersecurity

1 min read


Pinned

Why Attack Surface Management matters most?

This is part of a series from @ https://www.jym.sg/cyber-security-in-7-weeks! Every inch of that punching bag is like an Attack Surface. Attackers can “punch” systems with exposed areas ( Risk Exposures). The sum of all exposed areas is known as “Attack Surface”. These exposed areas are related to the means (or…

Cybersecurity

4 min read

Why Attack Surface Management matters most?
Why Attack Surface Management matters most?
Cybersecurity

4 min read


Pinned

Cyber Security in 7 weeks

⚡ Get there faster in 7 weeks so you don’t end up like Joe! Want to learn about “Cyber-Security” but not sure where to start or you are already overwhelmed & confused by the sheer amount of noise out there? This is the right place! Why you should read further? 💪🏼 Stand out & BE…

Cybersecurity

4 min read

Cyber Security in 7 weeks
Cyber Security in 7 weeks
Cybersecurity

4 min read


Nov 28, 2022

Mental Models for Cyber Defense — Part 1 of 3 — Attack Surface Management is a PRIORITY

Takeaways Mental models (how to decide) are necessary for effective Cyber Security (not just what to buy or how to implement). Cyber Security without strategies is sub-optimal (I will explain with a Sun Tze Art of War strategem 謀攻). Attack Surface management is a priority & something within your control because…

Cybersecurity

7 min read

Mental Models for Cyber Defense — Part 1 of 3 — Attack Surface Management is a PRIORITY
Mental Models for Cyber Defense — Part 1 of 3 — Attack Surface Management is a PRIORITY
Cybersecurity

7 min read


Oct 14, 2020

Ring-Fencing Adversaries with Win10 Pro

OpenEDR can stop Ransomware & auto-recover a fleet of purpose-built Window kiosks upon reboot. This entry adapts from the earlier approaches for non-kiosks environments, like a typical office that connects to the Internet. Let’s look at the features with respect to the problems & compare:

Openedr

4 min read

Ring-Fencing Adversaries with Win10 Pro
Ring-Fencing Adversaries with Win10 Pro
Openedr

4 min read


Jun 30, 2018

Adventures with FLSun QQ

Likes Larger print volume than my BIQU Magician (left side), 260 x 370mm Within my budget of ~$600SGD Has heat-bed, warms up quite quickly Mostly pre-assembled, quite easy to fix everything up Nice & helpful folks from Facebook user-groups: https://web.facebook.com/groups/120961628750040/ & https://web.facebook.com/groups/169601880462428/ Dislikes

4 min read

Adventures with FLSun QQ
Adventures with FLSun QQ

4 min read


Mar 11, 2018

BIQU Magician — 39 Days Later

Nicely packed printer, arrived on 31 Jan.

5 min read

BIQU Magician — 39 Days Later
BIQU Magician — 39 Days Later

5 min read


Jan 7, 2018

Designing for Usability

That sketch came about after I thought through the design details in my head while shopping with my wife, I had to get it out of my head before I forget. Version zero may look ok from the surface, but it has several flaws: As rightfully pointed out by…

Neopixel

3 min read

Designing for Usability
Designing for Usability
Neopixel

3 min read


Dec 11, 2017

Early Threat Warning Analytics Mind Map

https://coggle.it/diagram/WidE7aCQTwABWU-B/c4a183fcd1cb1eb5ae2022b799e4eccbda3e0f4aa06bd2c4742cb1440acb48eb

1 min read

Early Threat Warning Analytics Mind Map
Early Threat Warning Analytics Mind Map

1 min read


Dec 11, 2017

UAC Bypass Analysis

What is it & Why it matters? That is a User Account Control prompt, home users with an admin account would have seen this prompt at some point in time. For windows sys-admins, there are risks of running malicious payloads that bypass UAC & execute malicious tasks (eg. a ransomware). At the time of writing, there were…

Windows 10

5 min read

UAC Bypass Analysis
UAC Bypass Analysis
Windows 10

5 min read

Jym

Jym

114 Followers
Following
  • Mi'kail Eli'yah

    Mi'kail Eli'yah

  • NYU Center for Data Science

    NYU Center for Data Science

  • Dmitrii Eliuseev

    Dmitrii Eliuseev

  • Kevin Beaumont

    Kevin Beaumont

  • Vijay g

    Vijay g

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech