As you know, docking services are booming, docking container attacks are also on the rise. But this post will illustrate how the intruder is trying
In this guide on SIEM Windows Client Monitoring with Splunk, we focus on setting up a Splunk Universal Forwarder on a Windows machine. This setup
Have you ever heard about your critical data being exported somewhere else without your knowledge? Data exfiltration is a method of breaching the security and
Alternate Data Stream is an artifact of New Technology File system (NTFS) which was introduced by Windows. It was traditionally introduced so that it could
Splunk Inc. is an American public multinational corporation based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated big data via a Web-style interface. Splunk (the product) captures,
MISP is an open-source Threat intelligence and sharing platform (formerly known as Malware Information Sharing Platform) that is used for collecting, storing distributing and sharing
Today, in this article, we will focus on various methods that attackers implement to evade detection by hiding artifacts in the victim’s system to execute
In this post, we are going to discuss how we can abuse Kerberos protocol remotely using Python libraries “Impacket” for conducting the lateral movement attack.
In this post, we are going to discuss how we can connect to Victims machine remotely using Python libraries “Impacket” which you can download from