Red Teaming exercises are getting popular with the growth of security operations centers. These attack simulations aim to help companies improve their…

Weiterlesen

Nowadays more and more security tools are used to monitor and generate alerts from different sources (EDR, Proxy, etc.).These alerts often contains…

Weiterlesen

In June last year, the good folks at SpecterOps dropped awesome research on Active Directory Certificate Services (AD CS) misconfigurations. Since…

Weiterlesen

One of the rare cases where we can decrypt and recover files following-up with a ransomware attack.

Weiterlesen

This post provides ideas of processes to follow and gives basic guidance on how to collect, triage and analyze artifacts using Velociraptor

Weiterlesen