Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Year: 2015

  • Home
  • 2015
Exploitation Vulnerability assessment

Heap Spray attempts : Compromised site http://www.efendim.net

December 20, 2015April 23, 2022

On a Saturday evening I spent some time in upgrading my MacBook Pro with an SSD. The only SSD I had was having security Onion

Read More
Information Gathering OSINT

Information Gathering – Then, Now and Why ?

November 28, 2015April 23, 2022

Information gathering is considered first and most important part before launching any types of attacks, hacking or penetration testing. Information gathering is known by several

Read More
General Tips

Installing/running TOR on Linux distros

November 14, 2015April 23, 2022

TOR – The onion routing – famous for anonymity. TOR browser gives user an edge to be anonymous while browsing. Installing TOR on windows box

Read More
Phishing

A interesting email – FROM field empty

November 6, 2015April 23, 2022

Received a interesting email yesterday from Mr. Gordon Hills from London who wanted me to be partner and 5 Million dollars will be released to

Read More
General Tips Information Gathering

Comand line use to check IP reputation

November 6, 2015April 23, 2022

Looking for reputation of an IP address is one of the most frequent task of an SOC analyst. There are number of online tools and

Read More
Phishing Threat Intelligence

Westpac Spam and an approach to STIX language

November 4, 2015April 23, 2022

In my previous post regarding Westpac phishing mail, I mentioned associated domain and IP address. Recently, I am diving into the threat intelligence and especially

Read More
Fraud & Fin Crime Phishing

Westpac spam email – You have new notification

October 13, 2015April 23, 2022

Malicious or spam emails are frequent but one of the best ways to get a system/host infected. Recently I received an email from one of

Read More
Fraud & Fin Crime Phishing

An email from UN – attachment ATM_CARD_1.doc – IRREVOCABLE PAYMENT ORDER VIA ATM CARD

October 1, 2015April 23, 2022

Received an email from UN@ – no email domain on the sender list and that’s why my email identified as spam. Attachment was a doc

Read More
General Tips

Ubuntu – Security Onion Networking issue

October 1, 2015April 23, 2022

Been using Security Onion for a while now. A very good OS for analysis and getting IDS alerts on the go without installing expensive hardware.

Read More
Malware Analysis Phishing

NDISPlan phishing/malware email

September 24, 2015April 23, 2022

Based on my previous blog entry about emails I have analysed an email that was received from *@ndis.gov.au. From the email it seems that you

Read More

Posts navigation

1 2 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...