Blowing Cobalt Strike Out of the Water With Memory Analysis 53,650 people reacted Blowing Cobalt Strike Out of the Water With Memory Analysis By Dominik Reichel, Esmid Idrizovic and Bob Jung December 2, 2022 at 6:00 AM 18 15 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 65,422 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 22 9 min. read
Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware 76,457 people reacted Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware By Brad Duncan August 3, 2022 at 12:00 PM 56 8 min. read
Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive 82,066 people reacted Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive By Mike Harbison and Peter Renals July 19, 2022 at 3:00 AM 57 15 min. read
Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption 46,727 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj July 13, 2022 at 6:00 AM 31 9 min. read
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding 36,229 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj May 6, 2022 at 12:00 PM 11 9 min. read
Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect 60,056 people reacted Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect By Chris Navarrete, Durgesh Sangvikar, Andrew Guan, Yu Fu, Yanhui Jia and Siddhart Shibiraj March 16, 2022 at 3:00 PM 17 9 min. read
Case Study: From BazarLoader to Network Reconnaissance 57,012 people reacted Case Study: From BazarLoader to Network Reconnaissance By Brad Duncan October 18, 2021 at 6:00 AM 27 7 min. read
Wireshark Tutorial: Examining Traffic from Hancitor Infections 53,298 people reacted Wireshark Tutorial: Examining Traffic from Hancitor Infections By Brad Duncan April 7, 2021 at 6:00 AM 46 20 min. read
Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool 47,903 people reacted Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool By Brad Duncan April 1, 2021 at 12:00 PM 30 11 min. read