oscp OSCP 2020 Tips 269 days later.... dump of my notes and tips from my recent experience after passing the OSCP exam.
threatintel Excel 4.0 Macros - So hot right now...🔥🔥🔥 Analysis of Excel 4.0 macros and how to triage these .XLS files to gather IOCs from recent ITW samples such as ZLOADER, TRICKBOT and URSNIF.
trickbot TRICKBOT - Analysis Part II Some further TTPs used by TRICKBOT [1] from an infected host that I thought was interesting to share. The sample used here is from an EMOTET to TRICKBOT infection "GTAG:mor14"
trickbot TRICKBOT - Analysis Research into how to decode the TRICKBOT config, quickly analyse to provide context and help incident response/blue teams.
blueteam Blue Team Tips What are the best recommendations to a completely vulnerable, easily pwnable network? Where do you start? what tools? what logging? #DFIR #BlueTeamTips
blueteam Blue Team Basics - Local Admin Password Administration I used to be a Domain Administrator for a large AD deployment. Centralised account and access management was always a struggle so any solution to aid the manageability of administrative credentials is a
grrcon GrrCon 2017 DFIR write up - Level 1 #GrrCon 2017 #DFIR #CTF challenge. Several host images and memory dumps need to be analysed and investigated. Submit IOCs as you progress...
oscp CTF / Boot2Root / SickOS 1.2 If you've not figured out, this is a write-up and will contain spoilers NOTES Part of my OSCP pre-pwk-pre-exam education path, this is one of many recommended unofficial practice boxes. SickOs 1.2
ctf CTF / Boot2Root / Sick Os 1.1 If you've not figured out, this is a write-up and will contain spoilers NOTES Part of my OSCP pre-pwk-pre-exam education path, this is one of many recommended unofficial practice boxes. SickOs details (https:
community Infosec Newbie [Updated 20/07/2018] I have recently started a career in Cyber Security / Information Security. My path, somewhat recent might be useful for those just starting out. A few of these guides have
blueteam Blue Team Basics - PCAP File Extraction A few methods of how to carve data out of PCAPs. Whether this be a single analysis of some network traffic or part of a malware analysis lab. Using Wireshark Ideal for investigating
ctf GrrCon 2016 DFIR Write up - Part 3 Level 3 Question 16) What is the maldoc md5hash? Start by using FILESCAN and searching for documents .rtf, .doc, .docx etc... [email protected]:~# python volatility/vol.py -f /mnt/hgfs/Shared/Part3/ecorpwin7-e73257c4.
grrcon GrrCon 2016 DFIR Write up - Part 2 Level 2 Question 5) What is the password the malware used to enable remote access to the system? From the community Volatility section, download and call the 'editbox' plugin. Also, I didn't know,
forensics GrrCon 2016 DFIR Write up - Part 1 CTF HOMEPAGE https://ir.e-corp.biz/home To start off, get Volatility or a prebuilt vm like SANS SIFT Workstation, they've recommended using the provided Security Onion image. Also, check out the community
bro RaspberryPi NSM Foxhound: Blackbox - A RaspberryPi 3 NSM (Network Security Monitor) based on Bro, Netsniff-NG, Loki and Critical Stack. Suitable for a home 'blackbox' deployment - it will record everything that happens on your
phishing Multi-phish! Social engineering is a massive attack vector for both enterprise and home users. A friend received this crafty looking email this morning. Normally, I would just get them to check the link URL,
blueteam Blue Team Basics - Honeynets Creating a honeynet "All warfare is based on deception....when we are near, we must make the enemy believe we are far away" Sun Tzu, The Art of War Introduction A