The Missing LNK — Correlating User Search LNK files
https://www.fireeye.com/blog/threat-research/2020/02/the-missing-lnk-correlating-user-search-lnk-files.html
https://www.fireeye.com/blog/threat-research/2020/02/the-missing-lnk-correlating-user-search-lnk-files.html
Google Cloud Blog
The Missing LNK — Correlating User Search LNK files | Mandiant | Google Cloud Blog
UTM is a full featured virtual machine host for iOS. In short, it allows you to run Windows, Android, and more on your iPhone and iPad.
https://github.com/utmapp/UTM
https://github.com/utmapp/UTM
GitHub
GitHub - utmapp/UTM: Virtual machines for iOS and macOS
Virtual machines for iOS and macOS. Contribute to utmapp/UTM development by creating an account on GitHub.
Introduction To Modern Routing For Red Team Infrastructure - using Traefik, Metasploit, Covenant and Docker
https://khast3x.club/posts/2020-02-14-Intro-Modern-Routing-Traefik-Metasploit-Docker/
https://khast3x.club/posts/2020-02-14-Intro-Modern-Routing-Traefik-Metasploit-Docker/
QSynth - A Program Synthesis based Approach for Binary Code Deobfuscation
https://archive.bar/pdfs/bar2020-preprint9.pdf
https://archive.bar/pdfs/bar2020-preprint9.pdf
A curated list of threat detection and hunting resources
https://github.com/0x4D31/awesome-threat-detection
https://github.com/0x4D31/awesome-threat-detection
GitHub
GitHub - 0x4D31/awesome-threat-detection: ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️ - 0x4D31/awesome-threat-detection
CVE-2020-0688: REMOTE CODE EXECUTION ON MICROSOFT EXCHANGE SERVER THROUGH FIXED CRYPTOGRAPHIC KEYS
https://www.thezdi.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys
https://www.thezdi.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys
Zero Day Initiative
Zero Day Initiative — CVE-2020-0688: Remote Code Execution on Microsoft Exchange Server Through Fixed Cryptographic Keys
This most recent Patch Tuesday, Microsoft released an Important-rated patch to address a remote code execution bug in Microsoft Exchange Server. This vulnerability was reported to us by an anonymous researcher and affects all supported versions of Microsoft…
Forwarded from r0 Crew (Channel)
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing
Source: https://github.com/deepbindiff/DeepBinDiff
Article: https://www.ndss-symposium.org/wp-content/uploads/2020/02/24311.pdf
#reverse #dukeBarman
Source: https://github.com/deepbindiff/DeepBinDiff
Article: https://www.ndss-symposium.org/wp-content/uploads/2020/02/24311.pdf
#reverse #dukeBarman
GitHub
GitHub - yueduan/DeepBinDiff: Official repository for DeepBinDiff
Official repository for DeepBinDiff. Contribute to yueduan/DeepBinDiff development by creating an account on GitHub.
Computer accounts lateral movement
https://windowscybersec.com/2020/02/28/computer-accounts-can-move-laterally-too/
https://windowscybersec.com/2020/02/28/computer-accounts-can-move-laterally-too/
‘Cloud Snooper’ Attack Bypasses Firewall Security Measures
https://news.sophos.com/en-us/2020/02/25/cloud-snooper-attack-bypasses-firewall-security-measures/
https://news.sophos.com/en-us/2020/02/25/cloud-snooper-attack-bypasses-firewall-security-measures/
PRACTICAL THREAT HUNTING: DEVELOPING AND RUNNING A
SUCCESSFUL THREAT HUNTING PROGRAM
https://www.slideshare.net/ArpanRaval2/cyber-threat-hunting-workshop-229493446
SUCCESSFUL THREAT HUNTING PROGRAM
https://www.slideshare.net/ArpanRaval2/cyber-threat-hunting-workshop-229493446
SlideShare
Cyber Threat hunting workshop
Cyber Threat hunting workshop - Download as a PDF or view online for free
Windows Privilege Escalation Guide
https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
Absolomb
Windows Privilege Escalation Guide
Privilege escalation always comes down to proper enumeration. But to accomplish proper enumeration you need to know what to check and look for. This takes familiarity with systems that normally comes along with experience. At first privilege escalation can…