blog category

Research & Tradecraft

image for The PowerView PowerUsage Series #2

Research & Tradecraft

The PowerView PowerUsage Series #2

By: Will Schroeder
Aug 16, 2017 • 2 min read
Read Post
image for Attack Infrastructure Log Aggregation and Monitoring

Research & Tradecraft

Attack Infrastructure Log Aggregation and Monitoring

By: Jeff Dimmock
Aug 7, 2017 • 9 min read
Read Post
image for WSH Injection: A Case Study

Research & Tradecraft

WSH Injection: A Case Study

By: Matt Nelson
Aug 3, 2017 • 4 min read
Read Post
image for Offensive Encrypted Data Storage (DPAPI edition)

Research & Tradecraft

Offensive Encrypted Data Storage (DPAPI edition)

By: Will Schroeder
Jul 31, 2017 • 5 min read
Read Post
image for Bypassing AMSI via COM Server Hijacking

Research & Tradecraft

Bypassing AMSI via COM Server Hijacking

By: Matt Nelson
Jul 19, 2017 • 6 min read
Read Post
image for Host-based Threat Modeling & Indicator Design

Research & Tradecraft

Host-based Threat Modeling & Indicator Design

By: Jared Atkinson
Jul 18, 2017 • 18 min read
Read Post
image for The PowerView PowerUsage Series #1

Research & Tradecraft

The PowerView PowerUsage Series #1

By: Will Schroeder
Jul 17, 2017 • 5 min read
Read Post
image for Phishing Against Protected View

Research & Tradecraft

Phishing Against Protected View

By: Matt Nelson
Jul 13, 2017 • 6 min read
Read Post
image for A Pentester’s Guide to Group Scoping

Research & Tradecraft

A Pentester’s Guide to Group Scoping

By: Will Schroeder
Jun 20, 2017 • 15 min read
Read Post