malwarephile's profile picture. Detection and Response Analyst | OSCP, GREM 

Opinions are my own and not my employer

Unni Krishnan

@malwarephile

Detection and Response Analyst | OSCP, GREM Opinions are my own and not my employer

Unni Krishnan đã đăng lại

FileFix - A ClickFix Alternative mrd0x.com/filefix-clickf…

mrd0x's tweet image. FileFix - A ClickFix Alternative

mrd0x.com/filefix-clickf…

Unni Krishnan đã đăng lại

AND's only sale of the year is here! All courses are 25% off using the code BLESSYOURHEART at checkout.

NetworkDefense's tweet image. AND's only sale of the year is here! All courses are 25% off using the code BLESSYOURHEART at checkout.

Unni Krishnan đã đăng lại

How to use nano like a pro 👇


Unni Krishnan đã đăng lại

We're streaming one of the most popular talks from our Threat Detection Series. Pop in as @ForensicITGuy teaches us about capabilities of common stealers, how to detect the malware, and how to respond.


Unni Krishnan đã đăng lại

I have posted the slides for the #BlackHat talk @chompie1337 and I gave yesterday -> Close encounters of the advanced persistent kind: Leveraging rootkits for post-exploitation github.com/FuzzySecurity/…

FuzzySec's tweet image. I have posted the slides for the #BlackHat talk @chompie1337 and I gave yesterday -> Close encounters of the advanced persistent kind: Leveraging rootkits for post-exploitation

github.com/FuzzySecurity/…

Unni Krishnan đã đăng lại

Infostealer malware has risen to prominence as one of the most significant vectors of cybercrime over the past three years. Learn from @flaresystems about stealer logs and their role in the cybercrime ecosystem. #cybersecurity #malware #credentials bleepingcomputer.com/news/security/…


Unni Krishnan đã đăng lại

Interesting #FakeSG execution from an HTA payload that leads to #NetSupport. Find my SIGMA rule for detecting this cool cmstp.exe execution technique below: ➡️Lots of initial PowerShell obfuscated scripts ➡️Using cmstp.exe to install a fake connection manager service profile…

Kostastsale's tweet image. Interesting #FakeSG execution from an HTA payload that leads to #NetSupport. Find my SIGMA rule for detecting this cool cmstp.exe execution technique below:

➡️Lots of initial PowerShell obfuscated scripts
➡️Using cmstp.exe to install a fake connection manager service profile…
Kostastsale's tweet image. Interesting #FakeSG execution from an HTA payload that leads to #NetSupport. Find my SIGMA rule for detecting this cool cmstp.exe execution technique below:

➡️Lots of initial PowerShell obfuscated scripts
➡️Using cmstp.exe to install a fake connection manager service profile…
Kostastsale's tweet image. Interesting #FakeSG execution from an HTA payload that leads to #NetSupport. Find my SIGMA rule for detecting this cool cmstp.exe execution technique below:

➡️Lots of initial PowerShell obfuscated scripts
➡️Using cmstp.exe to install a fake connection manager service profile…

Unni Krishnan đã đăng lại

#APT #TransparentTribe Pooja.xlam f942baab036075e8ace437ccf96815a7 Embedded #CrimsonRAT oleObject2.bin bf86527f04d43718f77d8670e8996e90 svrdiv vsnivd.exe ccc9494310731383e0af5074278d2d8c 5323834444ae9db2d971ac08cdf579e7 64.188.19[.]199:8158

StopMalvertisin's tweet image. #APT #TransparentTribe

Pooja.xlam
f942baab036075e8ace437ccf96815a7

Embedded #CrimsonRAT

oleObject2.bin
bf86527f04d43718f77d8670e8996e90

svrdiv vsnivd.exe
ccc9494310731383e0af5074278d2d8c
5323834444ae9db2d971ac08cdf579e7

64.188.19[.]199:8158
StopMalvertisin's tweet image. #APT #TransparentTribe

Pooja.xlam
f942baab036075e8ace437ccf96815a7

Embedded #CrimsonRAT

oleObject2.bin
bf86527f04d43718f77d8670e8996e90

svrdiv vsnivd.exe
ccc9494310731383e0af5074278d2d8c
5323834444ae9db2d971ac08cdf579e7

64.188.19[.]199:8158

Unni Krishnan đã đăng lại

"ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end." #infosec #pentest #redteam github.com/lem0nSec/Shell…

CyberWarship's tweet image. "ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end."

#infosec #pentest #redteam 
github.com/lem0nSec/Shell…
CyberWarship's tweet image. "ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end."

#infosec #pentest #redteam 
github.com/lem0nSec/Shell…

Unni Krishnan đã đăng lại

Researchers uncover Statc Stealer, a dangerous #malware targeting Windows devices. It steals login data, cookies, #cryptocurency wallets, and sensitive information. thehackernews.com/2023/08/new-st… #cybersecurity #hacking #datasecurity


Unni Krishnan đã đăng lại

I discovered stealer known as #Agniane , malware is designed to target various crypto-related platforms, offering support for over 70+ crypto extensions, 10+ crypto wallets, gather sensitive information such as Telegram sessions, Discord tokens, Steam sessions.

MalGamy12's tweet image. I discovered stealer known as #Agniane ,  malware is designed to target various crypto-related platforms, offering support for over 70+ crypto extensions, 10+ crypto wallets, gather sensitive information such as Telegram sessions, Discord tokens, Steam sessions.
MalGamy12's tweet image. I discovered stealer known as #Agniane ,  malware is designed to target various crypto-related platforms, offering support for over 70+ crypto extensions, 10+ crypto wallets, gather sensitive information such as Telegram sessions, Discord tokens, Steam sessions.
MalGamy12's tweet image. I discovered stealer known as #Agniane ,  malware is designed to target various crypto-related platforms, offering support for over 70+ crypto extensions, 10+ crypto wallets, gather sensitive information such as Telegram sessions, Discord tokens, Steam sessions.
MalGamy12's tweet image. I discovered stealer known as #Agniane ,  malware is designed to target various crypto-related platforms, offering support for over 70+ crypto extensions, 10+ crypto wallets, gather sensitive information such as Telegram sessions, Discord tokens, Steam sessions.

Unni Krishnan đã đăng lại

[BLOG] Short post on using the Process Inject Kit in Cobalt Strike, which I feel is quite under-utilized based on the projects I've seen online. offensivedefence.co.uk/posts/cs-proce…


United States Xu hướng

Loading...

Something went wrong.


Something went wrong.