research blog
Threat hunting.
The most sophisticated actors.
Technical research across DFIR, malware analysis, threat hunting, and CTF write-ups. No product pitches, no fluff.
Credential Dumping from LSASS: What the Logs Actually Show
Most guides on LSASS credential dumping focus on the attacker
side. This one focuses on what you actually see in the event logs when it happens in your environment.
→
Getting Started with Zeek for Network Threat Hunting
Zeek is one of those tools that looks overwhelming at first.
After a few weeks of using it in a lab environment, here is how I actually got it to a useful state.
→
Lockpick 3.0 | HTB Forensics (Hard)
A ransomware decryption challenge where the encryption scheme looks custom at first
but turns out to be a misused AES implementation.
→
Writing Sigma Rules That Actually Work
A week of trialling Sigma rules against a real lab environment. A lot of
public rules are too noisy to be useful without tuning.
→
EDR Blind Spots: Where Modern Endpoint Tools Fall Short
Testing common EDR bypass techniques in a sandboxed
environment to understand where defenders have coverage gaps.
→
Using Velociraptor for Live Response on Windows
Velociraptor is free, fast, and genuinely useful for rapid triage. A
walkthrough of setting it up and collecting artefacts from a simulated compromised host.
→
Hunting Cobalt Strike Beacons in Network Traffic
Cobalt Strike is everywhere in incident reports. Understanding
the default beacon traffic patterns makes hunting it more approachable than most people expect.
→
Seized | HTB Forensics (Medium)
A disk image challenge involving a Windows host used to exfiltrate data. The
interesting part was figuring out which file was the payload and which was a decoy.
→
Event ID 4688 and Why Process Auditing Matters More Than You Think
If you are not logging process creation with command line
arguments enabled, you are missing a significant chunk of attacker activity.
→
Writing Your First Yara Rule: From Sample to Signature
Yara rules feel mysterious until you write one from
scratch against a real malware sample.
→