Skip to content

tsrvinnie@gmail.com

Threat Analysis

Threat Analysis

vcodispot.com

Menu

  • Home
  • Diary’s
  • Professional
    • Resume
    • Certifications
  • Contact
  • Linkedin
  • About

    Windows

    Accessing Windows Workstations (Updated 6/4/2018)

    Accessing Windows Workstations (Updated 6/4/2018)

    Accessing Vulnerable Windows Workstations on Network. (Updated 6/4/2018)     Microsoft has taken preventative measures against vulnerabilities that exist with SMBv1 by no longer including the network protocol after the Windows 10 Fall Creators Update and Windows Server, version 1709

    vince November 13, 2017March 1, 2020 Exploit, Linux, Windows Read more

    Geo-IP & System Info.

    Diary’s

    • Template Injection Vector Maldoc Analysis
    • Venmo Phishing Deploying Keylogger via Discord’s CDN
    • Emotet Makes Its Way to the Domain Controller
    • Emotet Analysis – The Revival
    • Zloader Infection Analysis
    • Maze Ransomware Analysis
    • Malicious RTF File Exploiting Equation Editor (CVE-2017-11882) Pushing Agent Tesla Malware
    • Extracting Encrypted KPOT Malware Pushed via COVID-19 Malspam
    • XSS JavaScript with Anti-Analysis Technique
    • Corrupted UPX Packed ELF Repair

    vcodispot.com | Threat Analysis Copyright ©2021