|
You are here |
adsecurity.org | ||
| | | | |
www.syspanda.com
|
|
| | | | | I wanted to write about the importance of checking for new services as this is an avenue in which attackers leverage their persistence methods. While looking at newly created services... [Continue Reading] | |
| | | | |
forensicitguy.github.io
|
|
| | | | | In this post I want to take a look at a PowerShell-based Cobalt Strike beacon that appeared on MalwareBazaar. This particular beacon is representative of most PowerShell Cobalt Strike activity I see in the wild during my day job. The beacons often show up as service persistence during incidents or during other post-exploitation activity. If you want to follow along at home, the sample I'm using is here: | |
| | | | |
wsummerhill.github.io
|
|
| | | | | Sliver has been a popular open-source C2 in recent years and has had continuous improvements since its release. It's cross-platform and easy to setup which were both appealing to me when I first started using it. I wanted to learn how to setup Sliver as a C2 server for red teams so I decided to document it for my own reference and anyone else interested. Here's what we'll cover: | |
| | | | |
eskonr.com
|
|
| | | Managing Windows endpoints with SCCM (System Center Configuration Manager) and co-management enabled can be challenging, especially when dealing with co-management issues. In this post, I'll share insights and troubleshooting steps to help you resolve issues with devices that are supposed to be co-managed by Intune but aren't appearing as expected. Background I recently worked on... | ||