red|blue

Offensive tactics, defensive countermeasures, threat analysis, and assorted ramblings... Go easy, we're learning as we go! Follow us on twitter @epicism1 @g_kay_c

Sunday, April 16, 2017

Automating APT Scanning with Loki Scanner and Splunk

›
One thing that I've been exploring lately is automating the large number of amazing open source security tools out in the world. One too...
4 comments:
Monday, February 27, 2017

Abusing Google App Scripting Through Social Engineering

›
I recently joined a new company (hooray) and have had the opportunity thus far to start thinking more heavily about a few topics that are, I...
8 comments:
Monday, November 21, 2016

Ransomware IR with PowerForensics and the USN Journal

›
Well it's certainly been a while since I made a post! I last blogged in February about Malware analysis and you can find that post her...
3 comments:
Thursday, October 20, 2016

Computer Security Incident Handling Guide - A presentation based off of the NIST paper

›
A few years ago during an interview at Mandiant I was asked to create a presentation based on the NIST  Computer SecurityIncident Handling G...
3 comments:
Tuesday, July 26, 2016

Audit Logging Configuration for the Linux Environment

›
One challenge to performing a proper incident investigation is dealing with missing event logs. Part of a healthy SOC posture is ensuring th...
2 comments:
›
Home
View web version
Powered by Blogger.