#Threathunting
One Of The Most Important Windows Processes For Threat Hunting (lsm-exe)
https://www.threathunting.se/2020/04/27/lsm-exe-one-of-the-most-important-windows-processes-for-threat-hunting/
🧪 @Phantasm_Lab
TipsOne Of The Most Important Windows Processes For Threat Hunting (lsm-exe)
https://www.threathunting.se/2020/04/27/lsm-exe-one-of-the-most-important-windows-processes-for-threat-hunting/
🧪 @Phantasm_Lab
Threat Hunting
lsm.exe | The Most Important Windows Processes For Threat Hunting
"lsm.exe" handles all the connections related to the terminal server on the hosted machine...In this series, we provide threat hunting tips...
New Skype Phishing Campaign Steals Users’ Passwords
https://www.threathunting.se/2020/04/24/new-skype-phishing-campaign-steals-users-passwords/
🧪 @Phantasm_Lab
https://www.threathunting.se/2020/04/24/new-skype-phishing-campaign-steals-users-passwords/
🧪 @Phantasm_Lab
Threat Hunting
New Skype Phishing Campaign Steals Users’ Passwords | Threat Hunting
Researchers discovered a new phishing campaign targeting Skype users and stealing their passwords...attackers send out phishing emails similar to a...
Hackers Steal More Than $25 Million In Cryptocurrency From Uniswap And Lendf.Me
https://www.threathunting.se/2020/04/20/hackers-steal-more-than-25-million-in-cryptocurrency-from-uniswap-and-lendf-me/
🧪 @Phantasm_Lab
Experts are currently investigating the attack; they suspect that the same hacker(s) could have used the exploit posted on GitHub to hack the two platforms; thus, the two attacks could be linked.
The two attacks are described as “reentrancy attack” meaning that hackers can siphon funds repeatedly before the transaction is approved or declined.https://www.threathunting.se/2020/04/20/hackers-steal-more-than-25-million-in-cryptocurrency-from-uniswap-and-lendf-me/
🧪 @Phantasm_Lab
Threat Hunting
Hackers Steal More Than $25 Million In Cryptocurrency From Uniswap And Lendf.Me
Cybercriminals have stolen more than $25 million worth of cryptocurrency from the Uniswap exchange and the Lendf.me lending platform...
Forwarded from The Hacker News
Malicious USB Drives Infect 35,000 Computers With Crypto-Mining Botnet
Read Details — https://thehackernews.com/2020/04/usb-drive-botnet-malware.html
Read Details — https://thehackernews.com/2020/04/usb-drive-botnet-malware.html
NSA/CSS Technical Cyber Threat Framework v2
https://media.defense.gov/2019/Jul/16/2002158108/-1/-1/0/CTR_NSA-CSS-TECHNICAL-CYBER-THREAT-FRAMEWORK_V2.PDF
https://media.defense.gov/2019/Jul/16/2002158108/-1/-1/0/CTR_NSA-CSS-TECHNICAL-CYBER-THREAT-FRAMEWORK_V2.PDF
Forwarded from DARKNET BR
📚 #Ebook | #Privacy | #Terrorists
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Forwarded from @Phantasm_Lab
The Hacker Playbook 2 - Practical Guide To Penetration Testing
https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
| PDF/EPUB/MOBI | 23/18/53 MB |https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Hacker PlayBook 3 - Pratical Guide To Penetration Testing
🕴🏽 @Phantasm_Lab
This is the third iteration of The Hacker Playbook (THP) series. Below is an overview of all the new vulnerabilities and attacks that will be discussed. In addition to the new content, some attacks and techniques from the prior books (which are still relevant today) are included to eliminate the need to refer back to the prior books. So, what's new? Some of the updated topics from the past couple of years include:- Abusing Active Directory- Abusing Kerberos- Advanced Web Attacks- Better Ways to Move Laterally- Cloud Vulnerabilities- Faster/Smarter Password Cracking- Living Off the Land- Lateral Movement Attacks- Multiple Custom Labs- Newer Web Language Vulnerabilities- Physical Attacks- Privilege Escalation- PowerShell Attacks- Ransomware Attacks- Red Team vs Penetration Testing- Setting Up Your Red Team Infrastructure- Usable Red Team Metrics- Writing Malware and Evading AV- And so much more🕴🏽 @Phantasm_Lab