SecTemple: hacking, threat hunting, pentesting y Ciberseguridad
▼
Showing posts with label Sysmon. Show all posts
Showing posts with label Sysmon. Show all posts

Unpacking AMSI: A Deep Dive into Bypass Techniques and Proactive Defense

›
The digital battlefield is a realm of shadows and whispers, where the keenest eyes discern the subtle shifts in the data streams. Amon...

Unveiling Hidden Audio Streams in Windows: A Threat Hunter's Guide

›
The digital realm hums with a symphony of data, but sometimes, the most intriguing melodies are the ones playing just beyond the visible s...

Anatomy of an Exploit: A Defensive Deep Dive with Kencypher

›
The digital realm is a battlefield. Data flows like blood, systems are the bodies, and vulnerabilities are the wounds that can bring down ...

Anatomy of a Calculator.exe Exploit: A Defensive Deep Dive

›
The flickering cursor on the terminal is a constant reminder of the digital shadows we navigate. In this domain, even the most innocuous...

Anatomy of Follina (CVE-2022-30190): A Defensive Deep Dive and Lab Setup

›
The flickering cursor on the terminal was a lonely beacon in the digital night. Another alert whispered through the wire – not a brute for...

APT 29 Threat Hunt: A Defensive Deep Dive into Sysmon Log Analysis

›
The digital shadows are long, and the whispers of nation-state actors are a constant hum beneath the surface of global networks. Today, w...
›
Home
View web version
Powered by Blogger.