Active Countermeasures

751 posts

Active Countermeasures banner
Active Countermeasures

Active Countermeasures

@ActiveCmeasures

Threat Hunting your network has never been so awesome! Creators of AC-Hunter. Contact us for a personal Q&A session.

Присоединился Şubat 2018
300 Подписки4.2K Подписчики
Black Hills Information Security
Black Hills Information Security@BHinfoSecurity·
The next free monthly one-hour training session with @ActiveCmeasures is on Threat Hunting C2: DNS TXT Record Abuse w/ Faan Rossouw! Join us for a free monthly one-hour training session on command & controls and malicious traffic with Faan Rossouw (Active Countermeasures) and learn a stealthy C2 technique that bypasses common DNS tunneling detections and how to catch it. Register: events.zoom.us/ev/Aqb16UU6sZM…
Black Hills Information Security tweet media
English
1
8
34
2.2K
Active Countermeasures
Active Countermeasures@ActiveCmeasures·
Is your DNS traffic hiding active C2? Join @faanross to learn how attackers abuse TXT records to bypass common tunneling detections. Reminder: Chat is in the BHIS Discord #live-chat for HACK IT credit. Date: Feb 20 Time: 12:00 PM EST Register: events.zoom.us/ev/Aqb16UU6sZM…
English
0
0
4
195
Active Countermeasures
Active Countermeasures@ActiveCmeasures·
An algorithm finds the hash, but it can't find the why. When attackers pivot, they aren't just changing code they're testing your intuition. Automation has a ceiling; human hunting doesn't. Learn why context is the key to the game: activecountermeasures.com/context-over-c…
English
0
1
2
125
Active Countermeasures
Active Countermeasures@ActiveCmeasures·
What happens when legitimate DFIR tools are used for harm? Join Episode 6 of Command & Convo to see how threat actors misuse Velociraptor for C2 and how to hunt for these pivots. Date: Jan 9 Time: 1:00 PM EST Register: events.zoom.us/ev/Ak_PCWcDNDa…
English
0
1
5
174
Active Countermeasures
Active Countermeasures@ActiveCmeasures·
A foundational protocol designed for network health is being weaponized by threat actors. ICMP, the simple troubleshooting tool, can be used to bypass defenses and maintain a covert C2 channel. Is your team hunting the echoes? Read the analysis: activecountermeasures.com/malware-of-the…
English
0
0
1
721
Active Countermeasures
Active Countermeasures@ActiveCmeasures·
You blocked the IPs, but the payload still arrived. How? It came in over DNS. Joker Screenmate hides tools and data inside TXT records, delivering malware under the cover of normal-looking DNS traffic. More here: activecountermeasures.com/malware-of-the…
English
0
0
1
154
Active Countermeasures
Active Countermeasures@ActiveCmeasures·
You don't want to miss next week's guest webcast!
English
0
0
2
821