top of page

Please access this website using a laptop / desktop or tablet for the best experience


Understanding DLL Hijacking / WMI: A Practical Guide
Introduction DLL hijacking is a technique used by attackers to exploit the way Windows applications load dynamic link libraries (DLLs) ....
-
Jan 22, 20243 min read


Part 6-(WMI): Hunting Down Malicious WMI Activity
In this blog, we delve into effective threat hunting strategies to uncover and counter malicious WMI activity, emphasizing the importance...
-
Jan 18, 20242 min read


Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER
This blog explores the significance of a specific attribute within MOF files – “#PRAGMA AUTORECOVER” – shedding light on its forensic...
-
Jan 17, 20242 min read
bottom of page