
0SKR
@saab_sec
Research @Mdseclabs
ID: 1241850161678016512
https://sabotagesec.com 22-03-2020 22:13:28
86 Tweet
618 Followers
217 Following


Saw Chetan Nayak (Brute Ratel C4 Author) post today on identifying C2 payloads based on stack telemetry. I have been working on private project myself ..something similar, a stack scanner. May be Chetan Nayak (Brute Ratel C4 Author) can share some insights .. sample detection of Havoc with sleepmask and stack dup enabled





#crashstrike CrowdStrike incident brought attention to the mysterious "Channel files", since then I have been trying to make sense of their beast of a sensor kernel module. Here is my progress, there is a lot interesting things in the code... Channel file processing in action!










My new blog post 🥳 Improving AFD Socket Visibility for Windows Forensics & Troubleshooting It discusses the low-level API under Winsock (IOCTLs on \Device\Afd handles) and explores the workings of the new socket inspection feature in System Informer 🔥 huntandhackett.com/blog/improving…