you sneakymonkey!
  • 127.0.0.1
  • OSCP
  • Github
  • My Feedly
  • CV
  • Cyber Security Challenge
  • Whitehatters Academy
Mark

Mark

17 posts •
oscp

OSCP 2020 Tips

269 days later.... dump of my notes and tips from my recent experience after passing the OSCP exam.

Mark Mark
threatintel

Excel 4.0 Macros - So hot right now...🔥🔥🔥

Analysis of Excel 4.0 macros and how to triage these .XLS files to gather IOCs from recent ITW samples such as ZLOADER, TRICKBOT and URSNIF.

Mark Mark
trickbot

TRICKBOT - Analysis Part II

Some further TTPs used by TRICKBOT [1] from an infected host that I thought was interesting to share. The sample used here is from an EMOTET to TRICKBOT infection "GTAG:mor14"

Mark Mark
trickbot

TRICKBOT - Analysis

Research into how to decode the TRICKBOT config, quickly analyse to provide context and help incident response/blue teams.

Mark Mark
blueteam

Blue Team Tips

What are the best recommendations to a completely vulnerable, easily pwnable network? Where do you start? what tools? what logging? #DFIR #BlueTeamTips

Mark Mark
blueteam

Blue Team Basics - Local Admin Password Administration

I used to be a Domain Administrator for a large AD deployment. Centralised account and access management was always a struggle so any solution to aid the manageability of administrative credentials is a

Mark Mark
grrcon

GrrCon 2017 DFIR write up - Level 1

#GrrCon 2017 #DFIR #CTF challenge. Several host images and memory dumps need to be analysed and investigated. Submit IOCs as you progress...

Mark Mark
oscp

CTF / Boot2Root / SickOS 1.2

If you've not figured out, this is a write-up and will contain spoilers NOTES Part of my OSCP pre-pwk-pre-exam education path, this is one of many recommended unofficial practice boxes. SickOs 1.2

Mark Mark
ctf

CTF / Boot2Root / Sick Os 1.1

If you've not figured out, this is a write-up and will contain spoilers NOTES Part of my OSCP pre-pwk-pre-exam education path, this is one of many recommended unofficial practice boxes. SickOs details (https:

Mark Mark
community

Infosec Newbie

[Updated 20/07/2018] I have recently started a career in Cyber Security / Information Security. My path, somewhat recent might be useful for those just starting out. A few of these guides have

Mark Mark
blueteam

Blue Team Basics - PCAP File Extraction

A few methods of how to carve data out of PCAPs. Whether this be a single analysis of some network traffic or part of a malware analysis lab. Using Wireshark Ideal for investigating

Mark Mark
ctf

GrrCon 2016 DFIR Write up - Part 3

Level 3 Question 16) What is the maldoc md5hash? Start by using FILESCAN and searching for documents .rtf, .doc, .docx etc... [email protected]:~# python volatility/vol.py -f /mnt/hgfs/Shared/Part3/ecorpwin7-e73257c4.

Mark Mark
grrcon

GrrCon 2016 DFIR Write up - Part 2

Level 2 Question 5) What is the password the malware used to enable remote access to the system? From the community Volatility section, download and call the 'editbox' plugin. Also, I didn't know,

Mark Mark
forensics

GrrCon 2016 DFIR Write up - Part 1

CTF HOMEPAGE https://ir.e-corp.biz/home To start off, get Volatility or a prebuilt vm like SANS SIFT Workstation, they've recommended using the provided Security Onion image. Also, check out the community

Mark Mark
bro

RaspberryPi NSM

Foxhound: Blackbox - A RaspberryPi 3 NSM (Network Security Monitor) based on Bro, Netsniff-NG, Loki and Critical Stack. Suitable for a home 'blackbox' deployment - it will record everything that happens on your

Mark Mark
phishing

Multi-phish!

Social engineering is a massive attack vector for both enterprise and home users. A friend received this crafty looking email this morning. Normally, I would just get them to check the link URL,

Mark Mark
blueteam

Blue Team Basics - Honeynets

Creating a honeynet "All warfare is based on deception....when we are near, we must make the enemy believe we are far away" Sun Tzu, The Art of War Introduction A

Mark Mark
you sneakymonkey! © 2022
Latest Posts Twitter Ghost