NeedPester-ing LOLBASWhile messing around with Pester.bat from the LOLBAS project, it’s mentioned that it can be executed from3d ago
Sukant KumarUnveiling the Spectrum of “Living Off Trusted” Techniques: A Deep Dive into Curated Projects.In my previous blog, I discussed the growing threat of “Living Off Trusted Sites” (LOTS), where attackers exploit legitimate websites and…Mar 3
Mahdi Haris HutamaPDF Analysis — Letsdefend challengewalkthrough how to investigate malicious PDF fileJan 11Jan 11
BlueteamOpsSecedit and I know it!First, let’s talk a bit about auditpol.exe, previous occasions of it being misused and how security policies gets applied to Windows hosts.Nov 24, 2022Nov 24, 2022
InSystem WeaknessbyElnur BadalovSOC164 — Suspicious Mshta BehaviorEvent ID: 113 Platform: LetsDefendJan 5Jan 5
NeedPester-ing LOLBASWhile messing around with Pester.bat from the LOLBAS project, it’s mentioned that it can be executed from3d ago
Sukant KumarUnveiling the Spectrum of “Living Off Trusted” Techniques: A Deep Dive into Curated Projects.In my previous blog, I discussed the growing threat of “Living Off Trusted Sites” (LOTS), where attackers exploit legitimate websites and…Mar 3
Mahdi Haris HutamaPDF Analysis — Letsdefend challengewalkthrough how to investigate malicious PDF fileJan 11
BlueteamOpsSecedit and I know it!First, let’s talk a bit about auditpol.exe, previous occasions of it being misused and how security policies gets applied to Windows hosts.Nov 24, 2022
InSystem WeaknessbyElnur BadalovSOC164 — Suspicious Mshta BehaviorEvent ID: 113 Platform: LetsDefendJan 5
Nasreddine BencherchaliWhy Hunting For LOLBINs Is One Of The Best BetsI never played poker so don’t quote me on thatFeb 2, 20221