Blowing Cobalt Strike Out of the Water With Memory Analysis 65,426 people reacted Blowing Cobalt Strike Out of the Water With Memory Analysis By Dominik Reichel, Esmid Idrizovic and Bob Jung December 2, 2022 at 6:00 AM 21 15 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 69,622 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 23 9 min. read
Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware 80,130 people reacted Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware By Brad Duncan August 3, 2022 at 12:00 PM 56 8 min. read
Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive 88,346 people reacted Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive By Mike Harbison and Peter Renals July 19, 2022 at 3:00 AM 58 15 min. read
Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption 49,570 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj July 13, 2022 at 6:00 AM 31 9 min. read
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding 39,026 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj May 6, 2022 at 12:00 PM 11 9 min. read
Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect 72,567 people reacted Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect By Chris Navarrete, Durgesh Sangvikar, Andrew Guan, Yu Fu, Yanhui Jia and Siddhart Shibiraj March 16, 2022 at 3:00 PM 18 9 min. read
Case Study: From BazarLoader to Network Reconnaissance 59,872 people reacted Case Study: From BazarLoader to Network Reconnaissance By Brad Duncan October 18, 2021 at 6:00 AM 27 7 min. read
Wireshark Tutorial: Examining Traffic from Hancitor Infections 57,964 people reacted Wireshark Tutorial: Examining Traffic from Hancitor Infections By Brad Duncan April 7, 2021 at 6:00 AM 46 20 min. read
Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool 50,593 people reacted Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool By Brad Duncan April 1, 2021 at 12:00 PM 30 11 min. read