Skip to content

Attacker's Mindset

Cyber Security and Related Topics – all opinions expressed are my own.

  • Home
    • Contact
  • Analyzing publicly-exposed Cobalt Strike beacon configurations
  • Large-Scale Hunting and Collection from Immature Networks
  • Ransomware Simulation Tactics
  • RetrievIR: Forensic Artifact Retrieval in PowerShell
  • Responding to Active Threats in Low-Maturity Environments
  • Working to Bypass CrowdStrike Prevention of Initial Foothold
  • Detecting Suspicious PowerShell scripts with Text Classification and Deep Neural Networks
  • Wiring up a Honeypot Network – BeeSting
  • Detections that Work – Kerberoasting
  • Anti-Forensics #1 / Time-Line Obfuscation
  • Malware Analysis #1 / Basic Static Analysis
  • Forensics #1 / File-Signature Analysis
  • Forensics #2 / Windows Forensics using Redline
  • Reverse Engineering #1 / Basic IDA Usage
  • Network Scanning #1 / Port Scanning, Anonymous FTP Querying, UDP Flooding
  • Network Scanning #2 / Basic Vulnerability Identification
  • Other Projects #1 / Writing a Basic HTTP Server

About

Mostly harmless insights about malware analysis, cryptography, protocol design, SCADA/WSN, penetration testing, application security, machine learning, development, detection engineering, threat hunting, incident response, forensics and other random topics.

Contact me at joeavanzato@gmail.com to complain about how bad my code is.

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
Like Loading...
Blog at WordPress.com.
  • Subscribe Subscribed
    • Attacker's Mindset
    • Already have a WordPress.com account? Log in now.
    • Attacker's Mindset
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
%d