top of page
![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
![Part 4-(Persistence) DLL Persistence Attacks: Navigating Windows Vulnerabilities](https://static.wixstatic.com/media/5fb032_70fd927168df450fb7f92954b11f25a0~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_70fd927168df450fb7f92954b11f25a0~mv2.webp)
-
Jan 22, 20243 min read
Part 4-(Persistence) DLL Persistence Attacks: Navigating Windows Vulnerabilities
Introduction: DLL (Dynamic Link Library) persistence attacks are a sophisticated breed of cyber threats that exploit legitimate and...
28 views0 comments
![Part 3 -(Persistence) Windows Persistence: A Deep Dive into Scheduled Tasks](https://static.wixstatic.com/media/5fb032_527d16be217e4c49a58d21f1511ebbad~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_527d16be217e4c49a58d21f1511ebbad~mv2.webp)
-
Jan 21, 20242 min read
Part 3 -(Persistence) Windows Persistence: A Deep Dive into Scheduled Tasks
In the intricate realm of Windows systems, achieving persistence is a paramount goal for adversaries seeking to maintain a foothold....
67 views0 comments
![Part 2-(Persistence) Windows Services: A Stealthy Avenue for Persistence](https://static.wixstatic.com/media/5fb032_94af8f0e7d0b49d9ab6514a2b11b787a~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_94af8f0e7d0b49d9ab6514a2b11b787a~mv2.webp)
-
Jan 20, 20243 min read
Part 2-(Persistence) Windows Services: A Stealthy Avenue for Persistence
In the intricate world of Windows operating systems, services play a pivotal role, running applications seamlessly in the background...
27 views0 comments
![Part 1-(Persistence): The Labyrinth of Autorun Locations in Windows](https://static.wixstatic.com/media/5fb032_07020f283e684a6aab4a24f7718cd281~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_07020f283e684a6aab4a24f7718cd281~mv2.webp)
-
Jan 19, 20242 min read
Part 1-(Persistence): The Labyrinth of Autorun Locations in Windows
Introduction: In the vast and intricate world of Windows operating systems, the presence of AutoStart Extension Points (ASEPs), commonly...
32 views0 comments
![Exploring Malware Persistence: Upcoming Topics](https://static.wixstatic.com/media/5fb032_26e55f2b114b4deaad7e37300e8f5244~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_26e55f2b114b4deaad7e37300e8f5244~mv2.webp)
-
Jan 18, 20241 min read
Exploring Malware Persistence: Upcoming Topics
This blog series aims to dissect various techniques employed by malicious actors to maintain a lasting presence on compromised systems....
9 views0 comments
![Part 6-(WMI): Hunting Down Malicious WMI Activity](https://static.wixstatic.com/media/5fb032_7c163cbfbf764f18b29f646e36954583~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_7c163cbfbf764f18b29f646e36954583~mv2.webp)
-
Jan 18, 20242 min read
Part 6-(WMI): Hunting Down Malicious WMI Activity
In this blog, we delve into effective threat hunting strategies to uncover and counter malicious WMI activity, emphasizing the importance...
60 views0 comments
![Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER](https://static.wixstatic.com/media/5fb032_65fc9224b91a4ae5a34246ceea769290~mv2.png/v1/fill/w_454,h_137,fp_0.50_0.50,q_95,enc_auto/5fb032_65fc9224b91a4ae5a34246ceea769290~mv2.webp)
-
Jan 17, 20242 min read
Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER
This blog explores the significance of a specific attribute within MOF files – “#PRAGMA AUTORECOVER” – shedding light on its forensic...
62 views0 comments
-
Jan 16, 20242 min read
Part 4-(WMI): The Intricacies of MOF Files: A Gateway for Malicious Infiltration in WMI
Understanding MOF Files: MOF(Managed Object Format) files act as blueprints for WMI, representing class definitions and instances....
46 views0 comments
![Part 3-(WMI): Understanding WMI Event Consumers in Cybersecurity](https://static.wixstatic.com/media/5fb032_f5d615193720406ba53a8d9d65b443f4~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_f5d615193720406ba53a8d9d65b443f4~mv2.webp)
-
Jan 15, 20242 min read
Part 3-(WMI): Understanding WMI Event Consumers in Cybersecurity
One such avenue often exploited by attackers is Windows Management Instrumentation (WMI) event consumers. This blog post delves into the...
36 views0 comments
![Part 2 -(WMI) :Detecting WMI-Based Attacks](https://static.wixstatic.com/media/5fb032_ed2740e1283e440e9fab6df6e138ec20~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_ed2740e1283e440e9fab6df6e138ec20~mv2.webp)
-
Jan 14, 20242 min read
Part 2 -(WMI) :Detecting WMI-Based Attacks
In this blog post, we will delve into the significance of detecting WMI-based attacks and explore techniques to defend against them....
55 views0 comments
![Part 1 - (WMI): A Dive in its Capabilities and Stealthy Persistence Techniques](https://static.wixstatic.com/media/5fb032_67e6c0c9e4134c1f8fcf9051638920ed~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_67e6c0c9e4134c1f8fcf9051638920ed~mv2.webp)
-
Jan 13, 20244 min read
Part 1 - (WMI): A Dive in its Capabilities and Stealthy Persistence Techniques
Introduction: In the complex landscape of Windows operating systems, one technology has stood the test of time—Windows Management...
144 views0 comments
![Power of Kansa: A Comprehensive Guide to Incident Response and Threat Hunting](https://static.wixstatic.com/media/5fb032_c8b389a65de2461bbdb3a706b4cc3486~mv2.png/v1/fill/w_421,h_136,fp_0.50_0.50,q_95,enc_auto/5fb032_c8b389a65de2461bbdb3a706b4cc3486~mv2.webp)
-
Jan 12, 20243 min read
Power of Kansa: A Comprehensive Guide to Incident Response and Threat Hunting
Kansa is one of the most powerful tool that can be used for threat hunting and incident response. But as per reddit Kansa is no longer...
52 views0 comments
![Single-line PowerShell commands for analysis](https://static.wixstatic.com/media/5fb032_a953fa9020b2444289efae72dbb8e16c~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_a953fa9020b2444289efae72dbb8e16c~mv2.webp)
-
Jan 9, 20242 min read
Single-line PowerShell commands for analysis
I was going through some articles and identified one of the best One-liners by @Leonard Savina. Guide on detecting potential remote...
30 views0 comments
![Incident Handlers Checklist and Personalize Windows investigation Cheat Sheet](https://static.wixstatic.com/media/5fb032_f4193fd08f884a3d80e8d2eb3328e6d4~mv2.png/v1/fill/w_454,h_315,fp_0.50_0.50,q_95,enc_auto/5fb032_f4193fd08f884a3d80e8d2eb3328e6d4~mv2.webp)
-
Jan 8, 20241 min read
Incident Handlers Checklist and Personalize Windows investigation Cheat Sheet
In previous blogs, I've delved into the intricacies of incident response, providing comprehensive information and theories. However,...
51 views0 comments
![Incident Response Framework Post-Incident Phase](https://static.wixstatic.com/media/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.webp)
-
Jan 8, 20242 min read
Incident Response Framework Post-Incident Phase
A critical phase: Post-Incident Activities. This phase, often overlooked, holds paramount importance in fortifying an organization's...
18 views0 comments
![Incident Response Framework Recovery Phase](https://static.wixstatic.com/media/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.webp)
-
Jan 7, 20242 min read
Incident Response Framework Recovery Phase
The phase of recovery stands as a critical endeavor, aiming not only to restore systems but also to fortify their resilience against...
19 views0 comments
![Incident Response Framework Eradication Phase](https://static.wixstatic.com/media/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.webp)
-
Jan 6, 20241 min read
Incident Response Framework Eradication Phase
In the realm of cybersecurity incidents, eradication strategy, hold paramount importance in mitigating the aftermath of a breach....
29 views0 comments
![Incident Response Framework Containment Phase](https://static.wixstatic.com/media/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.webp)
-
Jan 5, 20242 min read
Incident Response Framework Containment Phase
During a cybersecurity incident, the ability to swiftly contain the breach is pivotal to mitigating the potential damages. Containment...
24 views0 comments
![Incident Response Framework: Detection Phase](https://static.wixstatic.com/media/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.webp)
-
Jan 4, 20242 min read
Incident Response Framework: Detection Phase
In this phase we will determine if an incident has place, triage it, and notify relevant stakeholders and analyze it. To understand...
35 views0 comments
![Incident Response Framework: Preparation Phase](https://static.wixstatic.com/media/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_d4c8dd5d5f35417f8ea65398efbeba86~mv2.webp)
-
Jan 3, 20242 min read
Incident Response Framework: Preparation Phase
In the realm of cybersecurity, the preparation phase of an incident response plan lays the groundwork for effective handling of security...
38 views0 comments
bottom of page