/var/log/messages

Like all good researchers, we publish our findings for everyone’s benefit. The articles here evidence our commitment to technical excellence and the breadth of the disciplines we cover.

Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #5

By Alfie Champion on 8 July 2020

In the third part of F-Secure Consulting's Attack Detection Workshop series, covering Discovery and Lateral Movement, we explored a number of offensive techniques for discovering assets of value, be that users or file shares, and methods...

Read more

Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #4

By Alfie Champion on 8 July 2020

In the third part of F-Secure Consulting's Attack Detection Workshop series, covering Discovery and Lateral Movement, we explored a number of offensive techniques for discovering assets of value, be that users or file shares, and methods...

Read more

Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #3

By Alfie Champion on 8 July 2020

In the third part of F-Secure Consulting's Attack Detection Workshop series, covering Discovery and Lateral Movement, we explored a number of offensive techniques for discovering assets of value, be that users or file shares, and methods...

Read more

Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #2

By Alfie Champion on 8 July 2020

In the third part of F-Secure Consulting's Attack Detection Workshop series, covering Discovery and Lateral Movement, we explored a number of offensive techniques for discovering assets of value, be that users or file shares, and methods...

Read more

Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #1

By Alfie Champion on 8 July 2020

In the third part of F-Secure Consulting's Attack Detection Workshop series, covering Discovery and Lateral Movement, we explored a number of offensive techniques for discovering assets of value, be that users or file shares, and methods...

Read more

Helping root out of the container

By Pasi Saarinen on 3 July 2020

In the previous post we described how to perform privilege escalation using an unprivileged shell outside a container and a root shell within an unprivileged docker container.

Read more

Attack Detection Fundamentals: Code Execution and Persistence - Lab #2

By Anartz Martin on 3 July 2020

In the second part of F-Secure Consulting's Attack Detection Workshop series, covering Code Execution and Persistence, we explored a number of offensive techniques for achieving code execution and maintaining a foothold within a target environment.

Read more

Attack Detection Fundamentals: Code Execution and Persistence - Lab #1

By Anartz Martin on 3 July 2020

In the second part of F-Secure Consulting's Attack Detection Workshop series, covering Code Execution and Persistence, we explored a number of offensive techniques for achieving code execution and maintaining a foothold within a target environment.

Read more

Attack Detection Fundamentals: Initial Access - Lab #1

By Alfie Champion on 24 June 2020

In the first part of F-Secure Consulting's Attack Detection Workshop series, covering Initial Access, we explored a number of offensive techniques for obtaining a foothold within a target environment through the creation and successful delivery of...

Read more

Attack Detection Fundamentals: Initial Access - Lab #2

By Alfie Champion on 24 June 2020

In the first part of F-Secure Consulting's Attack Detection Workshop series, covering Initial Access, we explored a number of offensive techniques for obtaining a foothold within a target environment through the creation and successful delivery of...

Read more

Attack Detection Fundamentals: Initial Access - Lab #3

By Alfie Champion on 24 June 2020

In the first part of F-Secure Consulting's Attack Detection Workshop series, covering Initial Access, we explored a number of offensive techniques for obtaining a foothold within a target environment through the creation and successful delivery of...

Read more

Attack Detection Fundamentals: Initial Access - Lab #4

By Alfie Champion on 24 June 2020

In the first part of F-Secure Consulting's Attack Detection Workshop series, covering Initial Access, we explored a number of offensive techniques for obtaining a foothold within a target environment through the creation and successful delivery of...

Read more