Active Countermeasures

751 posts

Active Countermeasures banner
Active Countermeasures

Active Countermeasures

@ActiveCmeasures

Threat Hunting your network has never been so awesome! Creators of AC-Hunter. Contact us for a personal Q&A session.

Katılım Şubat 2018
300 Takip Edilen4.2K Takipçiler
Black Hills Information Security
Black Hills Information Security@BHinfoSecurity·
The next free monthly one-hour training session with @ActiveCmeasures is on Threat Hunting C2: DNS TXT Record Abuse w/ Faan Rossouw! Join us for a free monthly one-hour training session on command & controls and malicious traffic with Faan Rossouw (Active Countermeasures) and learn a stealthy C2 technique that bypasses common DNS tunneling detections and how to catch it. Register: events.zoom.us/ev/Aqb16UU6sZM…
Black Hills Information Security tweet media
English
1
8
34
2.2K
Active Countermeasures
Active Countermeasures@ActiveCmeasures·
An algorithm finds the hash, but it can't find the why. When attackers pivot, they aren't just changing code they're testing your intuition. Automation has a ceiling; human hunting doesn't. Learn why context is the key to the game: activecountermeasures.com/context-over-c…
English
0
1
2
125
Active Countermeasures
Active Countermeasures@ActiveCmeasures·
What happens when legitimate DFIR tools are used for harm? Join Episode 6 of Command & Convo to see how threat actors misuse Velociraptor for C2 and how to hunt for these pivots. Date: Jan 9 Time: 1:00 PM EST Register: events.zoom.us/ev/Ak_PCWcDNDa…
English
0
1
5
174
Active Countermeasures
Active Countermeasures@ActiveCmeasures·
A foundational protocol designed for network health is being weaponized by threat actors. ICMP, the simple troubleshooting tool, can be used to bypass defenses and maintain a covert C2 channel. Is your team hunting the echoes? Read the analysis: activecountermeasures.com/malware-of-the…
English
0
0
1
721
Active Countermeasures
Active Countermeasures@ActiveCmeasures·
You don't want to miss next week's guest webcast!
English
0
0
2
821