Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Author: fl0x2208

Just a common human being - want to share my knowledge and experience
  • Home
  • fl0x2208
  • Page 2
Malware Analysis Ransomware

Yet another WanaCry Ransomware – Analysis

June 10, 2017April 23, 2022

Recently, organizations are being targeted with new ransomware labelled as WanaCry. Being curious, I downloaded the sample to understand how the malware actually behaved. The

Read More
General Tips Legitimate tool analysis

PowerShell : Tool for Admins and Adversaries

February 19, 2017April 23, 2022

Readers! From last couple of weeks I have been doing some analysing of malware. Mostly, are via phishing attempts. What our adversaries are doing is

Read More
Forensics Threat Hunting

Finding Evidence of Data Exfil – USBStor artefacts

February 4, 2017April 23, 2022

Readers! Last year one of the member on SANS DFIR posted a question with regards to identifying whether there was any data leakage occurred in

Read More
Forensics General Tips Malware Analysis

Hash Values – A Trivial Artefact

December 27, 2016April 23, 2022

Readers! Merry Christmas and Happy new year to all. The days of holiday spam and vendor predictions are here. Here I am spending summer afternoon

Read More
Threat Intelligence

SANS FOR578 Cyber Threat Intelligence – Course Review

December 16, 2016April 23, 2022

Readers!!! Advanced greetings for Christmas. Before I start make sure to check out SANS Holiday Hack Challenge here. Recently, I was honoured to attend one

Read More
Fraud & Fin Crime Malware Analysis Threat Intelligence

Evoltin POS Malware – Kill Chain Mind Map

November 14, 2016April 23, 2022

Readers!!! Its been quite a while I have updated my blog posts, due to me spending  some quality time off the work and being with

Read More
Forensics General Tips

Forensics – Where to start and What to know

October 3, 2016April 23, 2022

Readers I would like to share my experience and understanding with regards to forensics and where I started to get a foothold in forensics. Questions

Read More
Threat Actor tool analysis

Disposable email addresses (DEA) and concerns

September 25, 2016April 23, 2022

Readers This post is about disposable email addresses and where to get them and concerns for organisations or whitehats defending their network/country. Disposable email addresses

Read More
Insider Threat

Battling Insider Threats – Browser in the box

September 9, 2016April 23, 2022

Readers One of the biggest threats for any organisation is Insider Threat. An employee visiting malicious sites, drive-by downloads, uploading documents etc. , in short

Read More
Forensics Incident Response

Incident Response and Forensics – The two towers

September 8, 2016April 23, 2022

Readers Been meaning write something about my experience with Incident response and forensics and how knowledge of both field helped me. Most of the organisations

Read More

Posts navigation

Previous 1 2 3 … 5 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...