/var/log/messages

Like all good researchers, we publish our findings for everyone’s benefit. The articles here evidence our commitment to technical excellence and the breadth of the disciplines we cover.

Attack Detection Fundamentals: C2 and Exfiltration - Lab #3

By Alfie Champion on 15 July 2020

In the fourth and final part of F-Secure Consulting's Attack Detection Fundamentals Workshop series, covering Command and Control (C2) and Exfiltration, we explored a number of attacker techniques for maintaining communication with an implant, blending in...

Read more

Attack Detection Fundamentals: C2 and Exfiltration - Lab #2

By Alfie Champion and Jordan LaRose on 15 July 2020

In the fourth and final part of F-Secure Consulting's Attack Detection Fundamentals Workshop series, covering Command and Control (C2) and Exfiltration, we explored a number of attacker techniques for maintaining communication with an implant, blending in...

Read more

Attack Detection Fundamentals: C2 and Exfiltration - Lab #1

By Alfie Champion and Derek Stoeckenius on 15 July 2020

In the fourth and final part of F-Secure Consulting's Attack Detection Fundamentals Workshop series, covering Command and Control (C2) and Exfiltration, we explored a number of attacker techniques for maintaining communication with an implant, blending in...

Read more

Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #5

By Alfie Champion on 8 July 2020

In the third part of F-Secure Consulting's Attack Detection Workshop series, covering Discovery and Lateral Movement, we explored a number of offensive techniques for discovering assets of value, be that users or file shares, and methods...

Read more

Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #4

By Alfie Champion on 8 July 2020

In the third part of F-Secure Consulting's Attack Detection Workshop series, covering Discovery and Lateral Movement, we explored a number of offensive techniques for discovering assets of value, be that users or file shares, and methods...

Read more

Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #3

By Alfie Champion on 8 July 2020

In the third part of F-Secure Consulting's Attack Detection Workshop series, covering Discovery and Lateral Movement, we explored a number of offensive techniques for discovering assets of value, be that users or file shares, and methods...

Read more

Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #2

By Alfie Champion on 8 July 2020

In the third part of F-Secure Consulting's Attack Detection Workshop series, covering Discovery and Lateral Movement, we explored a number of offensive techniques for discovering assets of value, be that users or file shares, and methods...

Read more

Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #1

By Alfie Champion on 8 July 2020

In the third part of F-Secure Consulting's Attack Detection Workshop series, covering Discovery and Lateral Movement, we explored a number of offensive techniques for discovering assets of value, be that users or file shares, and methods...

Read more

Helping root out of the container

By Pasi Saarinen on 3 July 2020

In the previous post we described how to perform privilege escalation using an unprivileged shell outside a container and a root shell within an unprivileged docker container.

Read more

Attack Detection Fundamentals: Code Execution and Persistence - Lab #2

By Anartz Martin on 3 July 2020

In the second part of F-Secure Consulting's Attack Detection Workshop series, covering Code Execution and Persistence, we explored a number of offensive techniques for achieving code execution and maintaining a foothold within a target environment.

Read more

Attack Detection Fundamentals: Code Execution and Persistence - Lab #1

By Anartz Martin on 3 July 2020

In the second part of F-Secure Consulting's Attack Detection Workshop series, covering Code Execution and Persistence, we explored a number of offensive techniques for achieving code execution and maintaining a foothold within a target environment.

Read more

Attack Detection Fundamentals: Initial Access - Lab #1

By Riccardo Ancarani on 24 June 2020

In the first part of F-Secure Consulting's Attack Detection Workshop series, covering Initial Access, we explored a number of offensive techniques for obtaining a foothold within a target environment through the creation and successful delivery of...

Read more