top of page

Please access this website using a laptop / desktop or tablet for the best experience


Understanding NTDS.DIT Extraction: A Critical Security Threat
Updated on 13 Feb, 2025 When securing an enterprise network, one of the most critical components to protect is the Domain Controller (DC)...
-
Jan 28, 20243 min read


Kerberos Ticket-Based Attacks Explained: A Friendly Guide
Kerberos is the authentication protocol used in Windows environments, providing secure logins through a system of tickets. But did you...
-
Jan 27, 20243 min read


Understanding LSA Secrets: A Hidden Security Risk in Windows
Updated 13 Feb,2025 When managing a Windows environment, one of the biggest security concerns is the storage of sensitive credentials....
-
Jan 26, 20243 min read


Understanding Cached Domain Credentials in Windows
Updated 13 Feb, 2025 In a Windows domain environment, authentication is usually handled by the domain controller (DC). But what happens...
-
Jan 25, 20243 min read


Understanding Token Stealing in Windows Environments
Updated in 13 Feb,2025 Introduction to Security Tokens in Windows Every time you log into a Windows system or run a process, the system...
-
Jan 24, 20243 min read


Understanding Credential Theft and Security in Windows
Updated on 13 Feb, 2025 In the world of cybersecurity, attackers prioritize credential collectio n almost immediately after gaining...
-
Jan 23, 20244 min read


Exploring Credentials theft way and defense: Upcoming Topics
In my upcoming blog series, we'll embark on a journey to unravel the complexities surrounding credential theft, exploring various attack...
-
Jan 22, 20241 min read


Understanding DLL Hijacking / WMI: A Practical Guide
Introduction DLL hijacking is a technique used by attackers to exploit the way Windows applications load dynamic link libraries (DLLs) ....
-
Jan 22, 20243 min read


Understanding Scheduled Tasks in Windows
When we talk about persistence in Windows, s cheduled tasks are one of the most effective and widely used methods . Simply put, a...
-
Jan 21, 20242 min read


Understanding Windows Services and Their Role in System Security
Windows Services are background processes that run independently of user interaction. They play a crucial role in maintaining system...
-
Jan 20, 20243 min read


Understanding AutoStart Persistence in Windows: Key Locations and Detection Methods
Updated on 12 Feb,2025 Windows provides numerous ways for applications—and unfortunately, malware—to persist on a system. These...
-
Jan 19, 20243 min read


Exploring Malware Persistence: Upcoming Topics
This blog series aims to dissect various techniques employed by malicious actors to maintain a lasting presence on compromised systems....
-
Jan 18, 20241 min read


Part 6-(WMI): Hunting Down Malicious WMI Activity
In this blog, we delve into effective threat hunting strategies to uncover and counter malicious WMI activity, emphasizing the importance...
-
Jan 18, 20242 min read


Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER
This blog explores the significance of a specific attribute within MOF files – “#PRAGMA AUTORECOVER” – shedding light on its forensic...
-
Jan 17, 20242 min read
Part 4-(WMI): The Intricacies of MOF Files: A Gateway for Malicious Infiltration in WMI
Understanding MOF Files: MOF(Managed Object Format) files act as blueprints for WMI, representing class definitions and instances....
-
Jan 16, 20242 min read


Part 3-(WMI): Understanding WMI Event Consumers in Cybersecurity
One such avenue often exploited by attackers is Windows Management Instrumentation (WMI) event consumers. This blog post delves into the...
-
Jan 15, 20242 min read


Part 2 -(WMI) :Detecting WMI-Based Attacks
In this blog post, we will delve into the significance of detecting WMI-based attacks and explore techniques to defend against them....
-
Jan 14, 20242 min read


Part 1 - (WMI): A Dive in its Capabilities and Stealthy Persistence Techniques
Introduction: In the complex landscape of Windows operating systems, one technology has stood the test of time—Windows Management...
-
Jan 13, 20244 min read


Remote Execution and Kansa – Still One of the Most Underrated IR Tools
Whenever I talk about incident response or large-scale data collection, one feature that never fails to amaze me is how PowerShell...
-
Jan 12, 20245 min read


Single-line PowerShell commands for analysis
I was going through some articles and identified one of the best One-liners by @Leonard Savina. Guide on detecting potential remote...
-
Jan 9, 20242 min read
bottom of page