Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Author: fl0x2208

Just a common human being - want to share my knowledge and experience
  • Home
  • fl0x2208
  • Page 3
Penetration Testing

Penetration Testing and Rules of engagement

September 3, 2016April 23, 2022

Readers This post is about globally accepted LEGAL technique to exploit a system or network to validate their deployment of security controls. Yes I am

Read More
Ransomware

Ransomware extensions and filenames

September 2, 2016April 23, 2022

As we all know Ransomware is currently one of the biggest threat to any organisation and therefore we must understand how a ransomware works and

Read More
Threat Hunting

Threat Hunting and Pyramid of Pain

August 15, 2016April 23, 2022

The buzz word first came in 2014 and individuals who were actually performing activities such as hunting for adversaries within network interested in Threat Hunting

Read More

Phishing SMS – A failed attempt

August 9, 2016April 23, 2022

Just about an hour ago I received an text from one of my mentors. Excited, I read but I know him very well and knew

Read More
Hunting Package Malware Analysis

YARA rule for Dridex

August 2, 2016April 23, 2022

Have been learning YARA from few days and below is my first YARA rule for a IOCs collected while analysing a word document. Analysis concluded

Read More
Hunting Package

List of IOCs collected so far

July 15, 2016April 23, 2022

Hunters, This post is to share indicators of compromise that I collected so far for analysis and investigation that I have been doing. Most of

Read More
Malware Analysis Phishing

A javascript file – Invoice from UK

June 23, 2016April 23, 2022

It’s been quite a while I was able to analyse my spam emails. Recently, I received an email with a zip attachment claiming to be

Read More
General Tips

The Vendor, The MSSPs and The Consultant

June 16, 2016August 23, 2022

I have been waiting for quite a while to write something about my experience with vendors, MSSPs and consultants. This is my own opinion and

Read More
Hunting Package Ransomware

CIF – Ransomware Tracker abuse.ch feeds

June 15, 2016April 23, 2022

Good Day guys!!!!!. Just finished another yml script to collect feeds from abuse.ch for Ransomware (ransomware tracker) and has been uploaded on my github account.

Read More
OSINT Threat Intelligence

CIF – Feodotracker threat feeds

June 14, 2016April 23, 2022

Good Day guys!!!!!. Was able to write another yml script to collect feeds from Feodotracker and has been uploaded on my github account and also

Read More

Posts navigation

Previous 1 2 3 4 5 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...