Profile picture

Written by Frog hi, hope you can find something useful in this blog - fr0g74

  1. February 22, 2024

    Memory forensics are fascinating. We can reveal find many signs of compromise and be sure that a process is infected. To start with this path I want to test how code injection done by different C2s can be identified on memory. Let's review this on a series of small blogs

  2. December 12, 2023

    What can we do to help our users avoid using weak passwords. You know like this ones: 2023 or 2023#, the ones you know the ones attacker will use against you. The ones we all know we shouldn't use.

  3. September 24, 2023

    Multiple ransomware attacks have targeted ESXI servers because of the effect this has on companies. With one EXSI server encrypted, the attackers can disrupt entire companies or sites. In this blog, I share some detection ideas and Yara rules.

  4. September 16, 2023

    This week has been really hectic. Multiple high-profile attacks around the globe and various people have attempted to analyze the little information we have. This has led to misinformation spreading and making people worry or take actions that may or may not be helpful. Let's discuss this.

  5. February 05, 2023

    Well a new malware sample to work on. This malware sample was interesting to me by the way the malware was obfuscated. It's pretty simple but I find it funny and interesting. Also, this malware sample seems to target a very specific demografic.

  6. January 29, 2023

    ADCS is a an Active Directory tool that lets administrators customize services in order to issue and manage public key certificates. And with some missconfiguration you can just became domain admin in few steps.

  7. January 09, 2023

    I've been working on some malware analysis and it has been interesting. There are different ways the malware is obfuscated, attempt to download and execute. On this blog, I will walk through the process and insight i have learned during this analysis.

  8. November 20, 2022

    One of the most common ways attackers gain privileges over a machine is using an exposed RDP machine. On this blog I want to show how some of these attacks happen, how we can detect them and some preventions we can take to avoid this type of incidents.

  9. September 14, 2022

    I have been writting about detectiong PowerShell monitoring. This I believe is a powerfull way to detect intrusions, but there are some thing we have to plan before doing this. Let's discuss some of this considerations.

  10. September 01, 2022

    Detection for enumeration using CMD was relative easy because it generates a new program we can audit, but on the case of PowerShell, this doesn't happen. It works on sessions that Interprets the commands and gives the result. This makes detection more difficult than with CMD, but with the correct event we can do it.

  11. July 03, 2022

    I'm planning on doing a series of blogs to show some enumeration techniques that I've been learning during these days on Pentest Academy. But as I like more the blue team side of thing I'm going to show how to detect this techniques, also on the last blog I plan to give the best detection that I have found for enumeration

  12. June 12, 2022

    I have been learning how to protect Active Directory, a critical part of IT. On this blog, I will write about some open source tools and configuration changes that can help you strengthen your defenses

  13. May 07, 2022

    I've finally gotten free from university (at least for now), so I've been listening to Darknet Diaries, I'm currently on episode 10, but the episode 5 #ASUSGATE remember me about secure by default. I want to explore my router and see how it's configure.

  14. April 14, 2022

    This week I decided to learn about rundll32.exe and dll files, a program that lets you execute exported dll functions and a file that allows many of the functionality of the OS. Rundll32 has a really interesting functionality that has been used by different attacker tools.

  15. March 30, 2022

    Lapsu$ manage to breach Okta, this breach shows some of the deficiencies security has even on big companies. Let's explore some of this deficiencies

  16. November 12, 2021

    Inside the machine is a easy to understand description of how computers work. This book explains concepts in a abstract but interesting way. Even though this book is not completely accurate with some descriptions and don't dive deep into some topics it's enough to understand how a computer works.