top of page
-
Jan 18, 20242 min read
Part 6-(WMI): Hunting Down Malicious WMI Activity
In this blog, we delve into effective threat hunting strategies to uncover and counter malicious WMI activity, emphasizing the importance...
59 views0 comments
-
Jan 17, 20242 min read
Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER
This blog explores the significance of a specific attribute within MOF files – “#PRAGMA AUTORECOVER” – shedding light on its forensic...
61 views0 comments
bottom of page