Skip to content

tsrvinnie@gmail.com

Threat Analysis

Threat Analysis

vcodispot.com

Menu

  • Home
  • Diary’s
  • Professional
    • Resume
    • Certifications
  • Contact
  • Linkedin
  • About

    Linux

    Accessing Windows Workstations (Updated 6/4/2018)

    Accessing Windows Workstations (Updated 6/4/2018)

    Accessing Vulnerable Windows Workstations on Network. (Updated 6/4/2018)     Microsoft has taken preventative measures against vulnerabilities that exist with SMBv1 by no longer including the network protocol after the Windows 10 Fall Creators Update and Windows Server, version 1709

    vince November 13, 2017March 1, 2020 Exploit, Linux, Windows Read more

    Data Dump(dd) to Create a Forensic Image with Linux

    Data Dump(dd) to Create a Forensic Image with Linux    There are a few Linux distributions designed specifically for digital forensics. These flavors contain examiner tools, and are configured not to mount (or mount as read only) a connected storage

    vince July 4, 2017March 1, 2020 Forensics, Linux Read more

    Geo-IP & System Info.

    Diary’s

    • Template Injection Vector Maldoc Analysis
    • Venmo Phishing Deploying Keylogger via Discord’s CDN
    • Emotet Makes Its Way to the Domain Controller
    • Emotet Analysis – The Revival
    • Zloader Infection Analysis
    • Maze Ransomware Analysis
    • Malicious RTF File Exploiting Equation Editor (CVE-2017-11882) Pushing Agent Tesla Malware
    • Extracting Encrypted KPOT Malware Pushed via COVID-19 Malspam
    • XSS JavaScript with Anti-Analysis Technique
    • Corrupted UPX Packed ELF Repair

    vcodispot.com | Threat Analysis Copyright ©2021