top of page

Search


Performing DLL Hijacking
In this blog, we'll learn about the concept of DLL hijacking, a technique that attackers and pentesters alike use to gain unauthorized access to the system. We will learn what DLLs are and exploit the way Windows OS loads the DLL (Dynamic Link Libraries), along with practical implications for how attackers can leverage them.
Mar 1110 min read
Â
Â


APT42: Operations, IOCs, Tactics, Detection Strategies
APT42 emulation strategy, current IOCs, TTPs, and detection guidance.
Mar 97 min read
Â
Â


APT29 (Midnight Blizzard): Operations, IOCs, Tactics, Detection Strategies
APT29/Midnight Blizzard emulation strategy, current IOCs, TTPs, and detection guidance for the Russian SVR-backed threat actor.
Mar 75 min read
Â
Â
Blog Categories
bottom of page