Identifying the Root Cause of Cybersecurity Incidents Involving Exploit Detonation on Windows Machines

- Posted in Incident Response by
Background: During the incident response stage of "Log Collection," it is highly valuable to collect comprehensive data from the servers, especially when the affected system is running Windows OS. [...] Read more

Building a Forensic USB Drive: Tools and Techniques for Imaging [ PART 1.5 ]

- Posted in Incident Response by
Background: In a previous article, I discussed the high-level preparations needed to acquire an image of a machine requiring forensic analysis. However, have you considered the caveats related to [...] Read more

Forensic Analysis Preparation for Windows Operating Systems in Incident Response: Utilizing Volatility for Memory Analysis [ PART 2 ]

- Posted in Incident Response by
Background: In our previous article, we discussed the preparation needed for the "log collection" stage of incident response, which is essential for the "analysis" stage. We covered how to prepare [...] Read more

Aligning Malware Analysis Stages with the MITRE ATT&CK Framework: A Unified Approach to Threat Detection and Response

- Posted in Incident Response by
Background: In incident response, knowing how to analyze malware is crucial. Relying only on sandboxes to study malware behavior often isn't enough. Sandboxes might miss important details that could [...] Read more

Mitigating the Risk: CVE-2024-39929 and Securing Exim Servers

- Posted in Hardenings by
Background: Exim is a mail transfer agent designed for Unix-like systems, providing flexible capabilities for managing your own email server. It serves as the entry point for email communication [...] Read more

The danger of leaked hash password from the perspective of defense in depth

- Posted in Leak by
Background: Before delving into the scope of leaked hashed passwords, it's important to understand the purpose of hashing. At a high level, hashing is a one-way function that transforms any input [...] Read more
Page 4 of 4