Skip to content

DMFR SECURITY

another security blog…

  • Reviews
  • About

Category: incident response

100 Days of YARA – Day 24: Run Keys

On January 12, 2022December 31, 2021 By DanielIn 100 days of Yara, incident response, malware, persistence, windows1 Comment

Find samples containing registry run key pathways with YARA.

100 Days of YARA – Day 23: socat

On January 11, 2022December 31, 2021 By DanielIn 100 days of Yara, incident response1 Comment

Detect socat with YARA.

100 Days of YARA – Day 4: Identifying Mach-O Files and Java Classes

On December 23, 2021December 23, 2021 By DanielIn 100 days of Yara, forensics, incident response, malware1 Comment

Detect Mach-O binaries with YARA.

100 Days of YARA – Day 1: Basics

On December 20, 2021 By DanielIn 100 days of Yara, forensics, incident response, malware1 Comment

Getting started with YARA.

YARA Rules Index

On December 20, 2021January 5, 2022 By DanielIn 100 days of Yara, forensics, incident response, malware50 Comments

YARA Rules Index

Accessibility Features Persistence

On September 10, 2021 By DanielIn incident response, lolbins, persistence, windowsLeave a comment

Abusing Accessibility Features as a persistence mechanism.

Malicious LNK Files

On September 8, 2021 By DanielIn forensics, incident response, malware, persistence, PowerShell, windowsLeave a comment

Malicious LNK files.

Scheduled Task Persistence

On September 7, 2021 By DanielIn incident response, persistence, windowsLeave a comment

Some notes on finding malicious Scheduled Tasks.

Get-ChildItem Performance

On August 23, 2021 By DanielIn forensics, incident response, PowerShell, windowsLeave a comment

I was writing some PowerShell scripts to scan disks for certain types of malware and realized that Get-ChildItem was kind of slow. I googled around and found this site which demonstrated using robocopy.exe and dir as faster alternatives to Get-ChildItem. Here were the results I had searching for LNK files on my disk using both …

Continue reading Get-ChildItem Performance

Cron Persistence

On August 23, 2021 By DanielIn incident response, Linux, malware, persistenceLeave a comment

All about cron persistence

REVIEW: RED TEAM Operator: Windows Evasion Course by SEKTOR7 Institute

On May 8, 2021 By DanielIn incident response, malware, pentesting, reviews, windowsLeave a comment

REVIEW: RED TEAM Operator: Windows Evasion Course by SEKTOR7 Institute.

Enumerating Processes with CreateToolhelp32Snapshot

On April 18, 2021 By DanielIn 100 Days of Code, incident response, malware, programming, windowsLeave a comment

Quick and dirty example of process enumeration using CreateToolhelp32Snapshot

Posts navigation

Older posts

Archives

  • February 2022 (12)
  • January 2022 (31)
  • December 2021 (15)
  • November 2021 (3)
  • October 2021 (7)
  • September 2021 (13)
  • August 2021 (13)
  • May 2021 (4)
  • April 2021 (23)
  • February 2021 (5)
  • January 2021 (6)
  • December 2020 (8)
  • February 2020 (2)
  • November 2019 (1)
  • October 2019 (2)
  • December 2018 (3)
  • July 2018 (1)
  • May 2017 (2)
  • April 2017 (5)
  • January 2017 (1)
  • December 2016 (4)

ascii assembler base64 binary C c++ cryptography CTF cyberchef ELF exiftool forensics golang hexadecimal hunting incident response java kali Linux malware netcat networking nmap pe pentesting persistence picoctf PowerShell procfs programming Python ransomware reversing reviews security shellcode shell scripting ssh steganography strings web win32 windows wireshark yara

Blog at WordPress.com.
DMFR SECURITY
Blog at WordPress.com.
  • Subscribe Subscribed
    • DMFR SECURITY
    • Join 57 other subscribers
    • Already have a WordPress.com account? Log in now.
    • DMFR SECURITY
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...