Skip to content

DMFR SECURITY

another security blog…

  • malware
  • incident response
  • CTF
  • forensics
  • pentesting
  • NSM
  • crackmes
  • reviews

Category: malware

Finding Processes With Suspicious CWD Using procfs

On February 27, 2021February 27, 2021 By DanielIn CTF, forensics, incident response, Linux, malware

Find malware running from temporary directories using procfs.

Finding Masquerading Processes With procfs

On February 27, 2021April 4, 2021 By DanielIn CTF, forensics, incident response, Linux, malware

Find masquerading processes using procfs.

Using procfs For Forensics and Incident Response

On February 23, 2021April 4, 2021 By DanielIn CTF, forensics, incident response, Linux, malware

Using procfs For Forensics and Incident Response.

Toggling Chrome Safe Browsing

On February 1, 2021April 4, 2021 By DanielIn malwareLeave a comment

Toggle Safe Browsing in Google Chrome.

Post-Exploitation With gawk

On January 27, 2021April 4, 2021 By DanielIn CTF, Linux, lolbins, malware, NSM, pentestingLeave a comment

Some post exploitation techniques using gawk.

Accessing Alternate Data Streams on VMDK Images on Linux

On January 10, 2021April 4, 2021 By DanielIn CTF, forensics, incident response, Linux, malware, pentesting, windowsLeave a comment

Accessing Alternate Data Streams on VMDK Images on Linux.

REVIEW:Malware Data Science – Attack Detection and Attribution

On January 10, 2021April 4, 2021 By DanielIn books, malware, reviewsLeave a comment

Review of Malware Data Science: Attack Detection and Attribution

REVIEW: RED TEAM Operator: Windows Persistence Course by SEKTOR7 Institute

On January 2, 2021April 4, 2021 By DanielIn forensics, lolbas, lolbins, malware, pentesting, programming, reviews, windowsLeave a comment

My review of SEKTOR7 Institute's Red Team Operator, Windows Persistence course.

Windows Startup Folders

On December 31, 2020April 4, 2021 By DanielIn forensics, incident response, malware, pentesting, windowsLeave a comment

Windows Startup Folder locations.

Volatility Notes

On December 20, 2020April 4, 2021 By DanielIn CTF, forensics, incident response, malwareLeave a comment

Some notes and links related to the Volatility Framework

Volatility on Ubuntu 20.04

On December 18, 2020April 4, 2021 By DanielIn CTF, forensics, incident response, Linux, malwareLeave a comment

Quick and dirty way to get Volatility working on Ubuntu 20.04

Windows base64 Encoding and Decoding Using certutil

On January 7, 2017April 4, 2021 By DanielIn CTF, lolbas, lolbins, malware, pentesting, Uncategorized, windows1 Comment

Use certutil.exe to encode and decode base64 on Windows.

Archives

  • April 2021 (1)
  • February 2021 (5)
  • January 2021 (6)
  • December 2020 (8)
  • February 2020 (2)
  • November 2019 (1)
  • October 2019 (2)
  • December 2018 (3)
  • July 2018 (1)
  • May 2017 (2)
  • April 2017 (5)
  • January 2017 (1)
  • December 2016 (4)

Archives

  • April 2021 (1)
  • February 2021 (5)
  • January 2021 (6)
  • December 2020 (8)
  • February 2020 (2)
  • November 2019 (1)
  • October 2019 (2)
  • December 2018 (3)
  • July 2018 (1)
  • May 2017 (2)
  • April 2017 (5)
  • January 2017 (1)
  • December 2016 (4)
Blog at WordPress.com.
Cancel

 
Loading Comments...
Comment
    ×