I am doing exercise to ensure that I stay current with recent techniques and vulnerabilities in the field. I will provide insights from both the
Payload injection with NtCreateSection and NtMapViewOfSection
This is yet another technique for injecting payloads into memory. We recognize that the majority of the techniques used involve similar steps. Nowadays, EDR is
IR Analysis on PSEXEC and Persistence
As the incident responder, evaluating a security breach can be a stimulating task. It requires the ability to connect various pieces of information in order
Beacon Object Files (BOF)
Another simple tutorial tonight. CobaltStrike is very flexible C2 framework that allow the adversaries to be so creative in order to develop their arsenal. In
Cobaltstrike Payload with Windows Fiber
I will be presenting a tutorial on a method for embedding a CobaltStrike shell within the C programming language. I am sharing this information based
Setup Backdoor with StayKit
In this article, I aim to discuss the process of installing a backdoor on a target system, focusing on various techniques that can be employed