Similar User
SOC photo

@SOC0923

あ photo

@119_cpa

ネト photo

@De4Ud7

yoyoyo photo

@y0h33

ミヌ@2y&5m photo

@EAv2vHjcEbOYcdr

ken@ITエンジニア photo

@kenITsec1022

松井聡 photo

@toto2000jp

浦渡良子(URADO, Ryoko) photo

@kiha_khl

7N3FIC / Takafumi Inoue photo

@takafumi_i

270012014 photo

@nVoAAClaJSd34Gp

Antqres photo

@Umbtqres

104$hit Reposted
Tweet Image 1

104$hit Reposted

New #lumma c2 panel on lummc2[.]fun with 0 detections on VT app.any.run/tasks/2d9867c3… Query used: services.http.response.favicons.md5_hash="565ac8716e4fd6028e64c29639bfede1" @ViriBack

Tweet Image 1
Tweet Image 2
Tweet Image 3

104$hit Reposted

#NorthKorean #APT28 #LazarusGroup #InvisibleFerret backdoor injected in public Node.js project start-server.js>http[://147[.124[.214[.129[:1244/j/s0HhMg2>test.js>.npl>bow & pay > 101[.106[.211[.[173[.rdns[.colocationamerica[.com[:1245 same for all OS

Tweet Image 1
Tweet Image 2
Tweet Image 3

104$hit Reposted

#APT #APT32 #OceanLotus #CobaltStrike #malware #threat 📍🇻🇳 💥🇨🇳🌏 ⛓️ #Phishing > Mal Doc > LNK run HTA > Drops LenovoDesk and Mal Dll > Dll Side-loading > Persistence > ShellCode > CobaltStrike beacon > #C2 🔗Knowsec 404 report: mp.weixin.qq.com/s?__biz=MzAxND…

Tweet Image 1

104$hit Reposted

A very late (due to vacation :) ) csv formatted list of #malspam campaigns that crossed my path in June to include #malware type, hashes, c2's, subjects, and email exfil addresses: gist.github.com/silence-is-bes… #retrohunt

Tweet Image 1
Tweet Image 2

104$hit Reposted

🚩 #BruteRatel#Latrodectus ▪ "Form_Ver-11-58-52.js" (https://firebasestorage.googleapis[.]com/v0/b/namo-426715.appspot.com/o/ PqA45bE7me%2FForm_Ver-11-58-52.js?alt=media&token=dc88189e-81de-49e9-879e-365bc76e3567 > bazaar.abuse.ch/sample/3ac8dec…) download BST.msi…

Tweet Image 1
Tweet Image 2
Tweet Image 3
This post is unavailable.

104$hit Reposted

ペンテスターが攻撃手法を練習するための脆弱な Active Directory 環境である GOAD を構築しました。 l3ickey.github.io/2024-05-29-GOA…


104$hit Reposted

📝インシデントレスポンス対応者むけのWindows フォレンジック ガイド。初歩的なところをざっくりとまとめてあるので、WindowsでのIR対応始める際のガイドとして役立ちそうです microsoft.com/en-us/security…


104$hit Reposted

#Shodan Query for #LummaStealer #Malware Query: http.html_hash:2013986754 asn:"AS29470" IOCs: 194.87.207[.]140 194.87.207[.]87 45.11.26[.]124 45.135.233[.]189 45.143.94[.]219 45.151.144[.]169 46.17.248[.]68 87.247.157[.]186 87.247.157[.]34

Tweet Image 1

104$hit Reposted

CVE-2023-50386: Apache Solr Backup/Restore APIs RCE. Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr. Poc github.com/vvmdx/Apache-S…

Tweet Image 1

104$hit Reposted

"TODDLERSHARK: ScreenConnect Vulnerability Exploited to Deploy BABYSHARK Variant" published by Kroll. #TODDLERSHARK, #CVE-2024-1709, #CVE-2024-1708, #KTA082, #CTI, #OSINT, #LAZARUS kroll.com/en/insights/pu…


104$hit Reposted

SharpHoundがどのようにしてSessionをcollectするのか解説した記事、勉強になる blog.compass-security.com/2022/05/bloodh…


104$hit Reposted

Advanced CyberChef Techniques for Configuration Extraction - Now in Blog Form 😁 A detailed look into advanced CyberChef operations applied to a config extractor (Flow Control, Registers, Regex, AES and Much Much More). 🔥 embee-research.ghost.io/advanced-cyber… #Malwareanalysis #CyberChef


104$hit Reposted

キングソフトの正規exeからのDLLサイドローディングで最終的にはCobalt Strike。 Attackers leverage PyPI to sideload malicious DLLs reversinglabs.com/blog/attackers…


104$hit Reposted

ICYMI: Lumen's @BlackLotusLabs ace CTI work on Volt Typhoon's KV Botnet, showing the power of Netflow and Temporal Analysis 🇨🇳 🔎 Lumen saw Netflow between the KV Botnet and two Guam telcos, a Guam ISP, and Guam Gov entity. 1. blog.lumen.com/routers-roasti… 2. blog.lumen.com/kv-botnet-dont…

Tweet Image 1
Tweet Image 2

104$hit Reposted

Latest @CISACyber report is packed with details on Volt Typhoon's 🇨🇳 tradecraft - the hottest APT on the block Specifically of note are the observations of Volt Typhoon targeting OT/BMS assets, like HVAC or CCTV, and their focus on domain controllers. cisa.gov/news-events/cy…


104$hit Reposted

I wrote my first blog post with @harfanglab: a primer on reverse engineering .NET AOT applications. harfanglab.io/en/insidethela… This will be interesting to people who never created FLAIR signatures in IDA.


104$hit Reposted

まとめ方含めてとてもよい解析レポートや Detailed Analysis of DarkGate; Investigating new top-trend backdoor malware medium.com/s2wblog/detail…


104$hit Reposted

Burp Suite 101 For Beginners🔥 #1 - Introduction and Installation: 🔗 hacklido.com/blog/621 #2 - Understanding Navigation, Dashboard, Configuration: 🔗hacklido.com/blog/624 #3 - Exploring Burp Proxy and Target Specification: 🔗hacklido.com/blog/625 #4 - Exploring Burp…


Loading...

Something went wrong.


Something went wrong.