Explore >> Select a destination


You are here

blog.flanker017.me
| | adsecurity.org
2.0 parsecs away

Travel
| | [AI summary] This article discusses the security features and benefits of PowerShell v5, including script block logging, system-wide transcripts, constrained PowerShell, and antimalware integration (AMSI) for enhanced system protection.
| | forensicitguy.github.io
4.3 parsecs away

Travel
| | In this post I want to take a look at a PowerShell-based Cobalt Strike beacon that appeared on MalwareBazaar. This particular beacon is representative of most PowerShell Cobalt Strike activity I see in the wild during my day job. The beacons often show up as service persistence during incidents or during other post-exploitation activity. If you want to follow along at home, the sample I'm using is here:
| | taeluralexis.com
1.6 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | buildingsofnewengland.com
14.1 parsecs away

Travel
| Edward Russell Norton (1871-1960) and his wife, Lillian (1870-1968) got married in 1904 and immediately began planning their dream home. They purchased a building lot on Powell Street in Brookline, Massachusetts, and hired architect, Robert Coit, to furnish plans for the new home which was completed by the next year. The house blends Arts and...