Crucial System Files That Can Be Leveraged by Threat Actors(Unexplored LOLBIN)

Post Views: 57 System files are integral to the smooth operation of your Windows operating system. However, when these files fall into the wrong hands, they can be leveraged for malicious purposes. In this blog, we will discuss their capabilities, and the potential threats they pose. ForFiles.exe Location: ‘C:\Windows\System32\forfiles.exe’ Supported Versions: Windows Vista onwards Capabilities: …

Investigating a Data Exfiltration Scenario

Post Views: 83 Hi everyone, today I want to discuss a data exfiltration scenario I recently encountered during an investigation. As a security researcher, it’s crucial to identify and understand how attackers are stealing data. Unusual Network Traffic The initial red flag was unusual network traffic patterns, which often indicate potential data exfiltration. This triggered …

Confidentiality, Integrity, and Availability (CIA)

Post Views: 1,588                   Confidentiality, integrity and availability, known as the CIA triad (Figure 1), is a guideline for information security for an organization. Confidentiality ensures the privacy of data by restricting access through authentication encryption. Integrity assures that the information is accurate and trustworthy. Availability ensures …

Small Description of Information Technology

Post Views: 71 Access Control List (ACL): A list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Application: A software program that runs on your computer. Web browsers, e-mail programs, word processors, and utilities are all …