Blue Team peeps. I've got a favor to ask. Do you have any screenshots of adversary activity you could share with me? Redacted where necessary, of course. I'm trying to help a friend out with a presentation they're giving. The person who was supposed to help her is in the hospital
-
-
this is a collection of sysmon logs from a blog post I wrote. first image are command line args from calling powershell, 2nd and 3rd images are analysis of the scripts in cyberchef, 4th image is analysis of the shellcode that the powershell script is attempting to deliver.pic.twitter.com/txF2b8rKSl
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Malware archeology has lists out the login ids to monitor for by win os
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.