arka0m.bsky.social
@arka0m.bsky.social
Reposted
Introduction to process injection in Linux

akamai.com/blog/securit...

Credits Ori David

#infosec #linux
December 7, 2024 at 9:12 PM
Reposted
Best read for today - #Microsoft exposes how a Russian #APT threat actor tied to the FSB compromised and used other APT threat actors - www.microsoft.com/en-us/securi... #cyberespionage #malware
December 5, 2024 at 9:26 AM
Reposted
Almost embarrassed to post this, but I've always used Fiddler or Burp for capturing things like this...

I didn't have admin rights and was trying to capture network traffic from a pop-up, so Dev Tools wasn't working

Apparently this is built into Chrome/Edge! So cool :)

edge://net-export/
November 17, 2024 at 6:49 AM
Reposted
While there are some awesome methods to detect web shells with Yara, sometimes structured data can help solve the case. In this oversimplified example, I go over how you can use two artifacts with Velociraptor to help you find evil on your Linux server.

#dfir #blueteam #cybersecurity
Hunting Linux Web Shells with Velociraptor
Linux forensics can be tricky, especially when investigating subtle threats like web shells. Unlike Windows, which provides tools like the Master File Table ($MFT) for metadata-rich investigations, Li...
www.linkedin.com
December 1, 2024 at 1:04 AM