Threat Actor Techniques
Presented by Jeremy Junginger at FIRST security conference 2014
This demo presents a realistic attack scenario exhibiting some of the methods and techniques used by threat actors to compromise an internal network, from the Internet.
Going through random security videos & reading since past few weeks. Here’s a nice video on malware analysis, from Shmoocon 2013. I found it useful for a quick revision of topics on the subject. …
A pentester performs several types of network scans during a test. These are usually sequential in nature, that is, we proceed with each scan, …
Hacking Safaribooks and downloading videos offline
I have a safaribooks account. A few hours back, I was going through a video series on safari & I thought I should download it for offline reference. Makes it easier to study.
To start with, a vulnerability is a weakness in the target system which creates a security risk – that it can be exploited.
An exploit is a way, …
1. TCP SYN sent
TCP SYN / ACK received
=> Target TCP Port is open
Reading up on Nmap. Thought of sharing this quick post.
Nmap probes a target before scanning it for open ports and services.
In the upcoming posts, I will be presenting a step by step process to analyze a piece of malware. I will be analyzing Slackbot. It is an old bot but nevertheless, customizable and useful in learning the malware analysis process.
Found Scareware being served on ESPN website. So, did a quick, short analysis.
Twitter is again in news (surprise!, anyone).
Another XSS worm hit Twitter creating (good, eh!) publicity of another portal – StalkDaily.