Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Category: General Tips

  • Home
  • General Tips
General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2022

January 3, 2023January 4, 2023

Readers! Happy New Year and Well Wishes. I thought to write about our beloved topic, Ransomware, and this time will focus on Australia. In this

Read More
General Tips Legitimate tool analysis

PowerShell : Tool for Admins and Adversaries

February 19, 2017April 23, 2022

Readers! From last couple of weeks I have been doing some analysing of malware. Mostly, are via phishing attempts. What our adversaries are doing is

Read More
Forensics General Tips Malware Analysis

Hash Values – A Trivial Artefact

December 27, 2016April 23, 2022

Readers! Merry Christmas and Happy new year to all. The days of holiday spam and vendor predictions are here. Here I am spending summer afternoon

Read More
Forensics General Tips

Forensics – Where to start and What to know

October 3, 2016April 23, 2022

Readers I would like to share my experience and understanding with regards to forensics and where I started to get a foothold in forensics. Questions

Read More
General Tips

The Vendor, The MSSPs and The Consultant

June 16, 2016August 23, 2022

I have been waiting for quite a while to write something about my experience with vendors, MSSPs and consultants. This is my own opinion and

Read More
General Tips Threat Intelligence

CIF – Collective Intelligence Framework – My deployment

June 1, 2016April 23, 2022

Morning Everybody!!!! Been working on crafting my skills in Threat Intelligence and available open source system. As the title says I have been working on

Read More
General Tips Malware Analysis

Malware Analysis – Mind Map

May 30, 2016April 23, 2022

Its been long time have updated my blog. Just busy @work and with family and trying to juggle a lot. Have been working a mind

Read More
General Tips

Installing/running TOR on Linux distros

November 14, 2015April 23, 2022

TOR – The onion routing – famous for anonymity. TOR browser gives user an edge to be anonymous while browsing. Installing TOR on windows box

Read More
General Tips Information Gathering

Comand line use to check IP reputation

November 6, 2015April 23, 2022

Looking for reputation of an IP address is one of the most frequent task of an SOC analyst. There are number of online tools and

Read More
General Tips

Ubuntu – Security Onion Networking issue

October 1, 2015April 23, 2022

Been using Security Onion for a while now. A very good OS for analysis and getting IDS alerts on the go without installing expensive hardware.

Read More

Posts navigation

1 2 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...