[SANS ISC] Video: Decrypting Cobalt Strike Traffic With Keys Extracted From Process Memory, (Sun, Nov 7th)

I made a video showing the steps to take to decrypt Cobalt Strike traffic that I covered in my diary entry “Decrypting Cobalt Strike Traffic With Keys Extracted From Process Memory“.

Didier Stevens
Senior handler
Microsoft MVP
blog.DidierStevens.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Source: Read More (SANS Internet Storm Center, InfoCON: green)

You might be interested in …

Daily NCSC-FI news followup 2021-09-15

Patch now! PrintNightmare over, MSHTML fixed, a new horror appears OMIGOD blog.malwarebytes.com/exploits-and-vulnerabilities/2021/09/patch-now-printnightmare-over-mshtml-fixed-a-new-horror-appears-omigod/ The September 2021 Patch Tuesday could be remembered as the final patching attempt in the PrintNightmare nightmare. The ease with which the vulnerabilities shrugged off the August patches doesn’t look to get a rerun. So far we haven’t seen any indications that this […]

Read More

[TheRecord] Estonia says a hacker downloaded 286,000 ID photos from government database

Estonian officials said they arrested last week a local suspect who used a vulnerability to gain access to a government database and download government ID photos for 286,438 Estonians. The post Estonia says a hacker downloaded 286,000 ID photos from government database appeared first on The Record by Recorded Future. Source: Read More (The Record […]

Read More

[SecurityWeek] Dutch Group Launches Data Harvesting Claim Against TikTok

All posts, Security Week

A Dutch consumer group is launching a 1.5 billion euro ($1.8 billion) claim against TikTok over what it alleges is unlawful harvesting of personal data from users of the popular video sharing platform. read more Source: Read More (SecurityWeek RSS Feed)

Read More