Detecting Popular Cobalt Strike Malleable C2 Profile Techniques 17,505 people reacted Detecting Popular Cobalt Strike Malleable C2 Profile Techniques By Durgesh Sangvikar, Matthew Tennis, Chris Navarrete, Yanhui Jia, Yu Fu and Nina Smith June 27, 2023 at 3:00 PM 18 6 min. read
Blowing Cobalt Strike Out of the Water With Memory Analysis 72,422 people reacted Blowing Cobalt Strike Out of the Water With Memory Analysis By Dominik Reichel, Esmid Idrizovic and Bob Jung December 2, 2022 at 6:00 AM 23 15 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 72,025 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 26 9 min. read
Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware 81,400 people reacted Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware By Brad Duncan August 3, 2022 at 12:00 PM 58 8 min. read
Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive 90,843 people reacted Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive By Mike Harbison and Peter Renals July 19, 2022 at 3:00 AM 60 15 min. read
Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption 51,045 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj July 13, 2022 at 6:00 AM 31 9 min. read
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding 40,501 people reacted Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj May 6, 2022 at 12:00 PM 11 9 min. read
Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect 77,848 people reacted Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect By Chris Navarrete, Durgesh Sangvikar, Andrew Guan, Yu Fu, Yanhui Jia and Siddhart Shibiraj March 16, 2022 at 3:00 PM 18 9 min. read
Case Study: From BazarLoader to Network Reconnaissance 60,991 people reacted Case Study: From BazarLoader to Network Reconnaissance By Brad Duncan October 18, 2021 at 6:00 AM 29 7 min. read
Wireshark Tutorial: Examining Traffic from Hancitor Infections 60,000 people reacted Wireshark Tutorial: Examining Traffic from Hancitor Infections By Brad Duncan April 7, 2021 at 6:00 AM 46 20 min. read
Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool 51,511 people reacted Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool By Brad Duncan April 1, 2021 at 12:00 PM 30 11 min. read