Microsoft “Defender Nuke” (Via Safe Mode)
A nice little VBS script I wrote for a one stop shop for defender nuking. Script features: You need to be a local admin on the box. Defender will be…
A nice little VBS script I wrote for a one stop shop for defender nuking. Script features: You need to be a local admin on the box. Defender will be…
Summary Hosts Setting Up The Lab Set up bindings in IIS for HTTPS for the Default Web Site Navigate to https://192.168.1.30/certsrv, make sure you can navigate to the portal and…
Below walks through the creation of a malware analysis VM using the latest version of Windows 11 (24H2) and Mandiant’s Flare-VM. This is a much easier process to do on…
Hey all, thought I would share my notes for the CISSP certification if anyone was thinking of taking it. Certainly one of the big boy exams within the industry and…
You might have seen in some of the security news sites, articles reporting about a security researcher discovering a method to stop certain ransomware samples from running, including Thanos, Conti,…
Introduction GrayLog is a powerful open source SIEM solution. With hosting within Azure there was additional parameters that needed to be changed to get it to work. If you are…
C2 Covert Channels Today we’re exploring the world of obscure C2 channels, specifically DNS covert channels. Attackers know that DNS is widely used and trusted. Furthermore, because DNS is not…
An error in Microsoft Windows prior to Windows 10 when processing access to the root $ MFT file in the root directory may cause the system to crash. This can…
Summary On October 9th an interesting method was described to execute arbitrary code in Microsoft Word with the use of the Dynamic Data Exchange (DDE Protocol). The method was described…
Metadata & Hidden Information Within Documents Document metadata is information attached to a file that may not be visible on the face of the document; documents may also contain supporting…