PinnedPublished inDigital ForensicsAnalysing Encoded Powershell and ShellcodeBase64 encoded PowerShell commands can often be a quick win for the identification of suspicious activity. Recently, I've come across some…Apr 26, 20211Apr 26, 20211
Published inMalware AnalysisLab 6 — C Code Constructs in AssemblySolutions for Lab 6 within Practical Malware Analysis.Jan 2, 2022Jan 2, 2022
Published inMalware AnalysisLab 5 — IDA ProSolutions for Lab 5 within Practical Malware Analysis.Dec 29, 20212Dec 29, 20212
Published inBlue Team Labs Online — WalkthroughsBTLO — Phishy-v1BTLO (blueteamlabs.online)Apr 30, 2021Apr 30, 2021
Published inBlue Team Labs Online — WalkthroughsBTLO —Malicious PowerShell AnalysisBTLO (blueteamlabs.online)Apr 30, 2021Apr 30, 2021
Published inBlue Team Labs Online — WalkthroughsBTLO — Network Analysis — Web ShellBTLO (blueteamlabs.online)Apr 30, 2021Apr 30, 2021
Published inBlue Team Labs Online — WalkthroughsBTLO — PretiumBTLO (blueteamlabs.online)Apr 2, 2021Apr 2, 2021
Published inBlue Team Labs Online — WalkthroughsBTLO — CountdownBTLO (blueteamlabs.online)Apr 2, 2021Apr 2, 2021
Published inDigital ForensicsShellbag AnalysisAnalysis of Shellbags is extremely useful method of determining what file or folder actions have been taken on a host by a specific user.Nov 17, 2020Nov 17, 2020