blog category

Research & Tradecraft

image for Designing Peer-To-Peer Command and Control

Research & Tradecraft

Designing Peer-To-Peer Command and Control

By: Ryan Cobb
May 1, 2019 • 19 min read
Read Post
image for Lateral Movement — SCM and DLL Hijacking Primer

Research & Tradecraft

Lateral Movement — SCM and DLL Hijacking Primer

Summary As Defenders increase in maturity, the more they are able to leverage built-in utilities against...

By: Dwight Hohnstein
Apr 18, 2019 • 11 min read
Read Post
image for Revisiting TTPs: TimeStomper

Research & Tradecraft

Revisiting TTPs: TimeStomper

In this post, I will cover how to manipulate file times on the Windows OS. Manipulating...

By: Justin Bui
Apr 16, 2019 • 8 min read
Read Post
image for Merlin v0.7.0 Release & Roll-up

Research & Tradecraft

Merlin v0.7.0 Release & Roll-up

By: Russel Van Tuyl
Apr 12, 2019 • 10 min read
Read Post
image for Folder Actions for Persistence on macOS

Research & Tradecraft

Folder Actions for Persistence on macOS

By: Cody Thomas
Apr 8, 2019 • 9 min read
Read Post
image for Go Phishing (and Reporting)

Research & Tradecraft

Go Phishing (and Reporting)

By: Christopher Maddalena
Apr 1, 2019 • 11 min read
Read Post
image for Perfect is the Enemy

Research & Tradecraft

Perfect is the Enemy

By: Robby Winchester
Mar 26, 2019 • 7 min read
Read Post
image for The Hitchhiker’s Guide To Initial Access

Research & Tradecraft

The Hitchhiker’s Guide To Initial Access

Abusing Bias — Part 2 (Mostly) Harmless If aliens started monitoring Earth, it would appear that...

By: Kelly Villanueva
Mar 8, 2019 • 12 min read
Read Post
image for A Case Study in Wagging the Dog: Computer Takeover

Research & Tradecraft

A Case Study in Wagging the Dog: Computer Takeover

By: Will Schroeder
Feb 28, 2019 • 7 min read
Read Post