Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Month: February 2017

  • Home
  • 2017
  • February
General Tips Legitimate tool analysis

PowerShell : Tool for Admins and Adversaries

February 19, 2017April 23, 2022

Readers! From last couple of weeks I have been doing some analysing of malware. Mostly, are via phishing attempts. What our adversaries are doing is

Read More
Forensics Threat Hunting

Finding Evidence of Data Exfil – USBStor artefacts

February 4, 2017April 23, 2022

Readers! Last year one of the member on SANS DFIR posted a question with regards to identifying whether there was any data leakage occurred in

Read More

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...