Lead by Example Isn’t a Problem
This blog post is dedicated to providing my opinions on Don’t Lead by example by James Cowling. I believe that the situation explained in the article is simplified and it may have many related environmental and personal factors that aren’t mentioned. So, I would like to talk only about the important part of this article. The solution.
Deploy Your Own Local MISP with HTTPS Supported by mkcert
In this short tutorial, I will walk through the steps to integrate SSL/TLS into Malware Intelligence Sharing Platform (MISP) with mkcert by Filippo Valsorda. To make it more simple, I will use docker version of MISP available here as an example.
Endpoint Protection, Detection and Response Bypass Techniques Index
I’ve recently seen a bunch of articles and researches on endpoint protection and endpoint detection and response bypass techniques, so I decided to spend my research time to do document about these techniques and how was it done in summary. There is no category on these techniques as far as I know so I will simply categorize techniques by products.
Understandings on .SettingContent-ms as aื Initial Access Vector
.SettingContent-ms is a format of file that allow a user to create “shortcuts” to options available on Windows 10 setting pages
My Forked Version of msfrpc with Python3 Support
The Metasploit’s msgrpc module utilized MessagePack, a binary serialized version of JSON, as a format and only requirement to use this feature is to load msgrpc module…