Posts
Automating DFIR pipelines …
Automating DFIR pipelines with OpenRelik
Rationale
In a previous blog post, I explored the potential of Velociraptor
as a tool for acquiring artefacts, performing triage tasks from clients through the KAPE.Files
artefact, and then processing them with Hayabusa
and Plaso
to generate Timelines and …
Exploring DKOM (Direct …
Exploring DKOM for Process Hiding on Windows
In this post we will explore the DKOM (Direct Kernel Object Manipulation) technique, a well-known stealth method used by advanced malware and rootkits on Windows systems to hide processes from standard system monitoring tools.
What is DKOM
?
DKOM
stands …
Hayabusa + Velociraptor …
A practical guide to building forensic timelines
This write-up shows how to build timelines from Windows machines to be examined in Triage following a compromise, from the acquisition of all artifacts to the generation of a Super-Timeline and its visualisation with Timesketch using tools such as …
MalRar - Compressing …
Embedding a Malicious Executable into a Regular PDF or EXE
🛠️ Let’s assume we have already created our malicious executable, which will perform certain actions on the victim’s host or send us a reverse shell.
The following steps describe the process of creating our file to make it look …