A Walk Down Adversary Lane - XP sp1

October 18, 2019

Python, IronPython, C#/.Net "OH MY" **SILENTTRINITY**

February 23, 2019

Measuring your Defenses for Reals...

October 28, 2018

The Evolving Threat - IoT Botnets

October 3, 2018

Memory Forensics – Process Analysis Part 1 of 2

March 19, 2018

Please reload

Please reload


October 18, 2019

I’ve been in the business of IT/Security for about 30 years now and I am always looking for ways to improve my skillset and understanding the various domains of security.  One area I always found interesting is the offensive side of security.  I find it extremely impor...

February 23, 2019

I came across this interesting tool a few weeks ago called SILENTTRINITY.  Its a post-exploitation tool created in Python and leveraged IronPython and C# to accomplish Offensive tasks many Red Teamers and Penetration folks use PowerShell to complete.  So I created a qu...

October 28, 2018

So what’s the problem?  

I hate stating the obvious but in this blog I’m going to anyway.  Regardless of the advancements in security controls, attackers continue to successfully complete their cyber missions against organizations whether it’s to steal sensitive informa...

October 3, 2018

IoT Device

A widely used definition of the Internet of Things (IoT) is it that it is a network of physical devices, vehicles, structures and other objects - embedded with electronics, software, sensors, actuators, and network connectivity (they have an IP address) that...

March 19, 2018

In a previous blog (Memory Forensics 101) I talked high level about memory forensics in general and the use of Volatility.  In this blog I would like to walk through the various plugins you can use to analyze a memory image acquired from a machine infected with Kovter...

March 7, 2018

A quick conversation with Peter Burris for a CUBE Conversation at the CUBE Studios, Palo Alto.

March 5, 2018

What is it?

Most people know about traditional computer forensics where you analyze the artifacts on disk such as files, folders, registries, seen processes, etc.  You’re usually trying to find evidence that the computer has been compromised and what malicious actions h...

December 8, 2017

Heimdal PRO - the security solution for everyone 

The Internet is not a safe place to navigate without a security software product installed on your computer. And you need more than an antivirus or a good firewall solution to keep your data safe from all kind of cyber a...

November 2, 2017

Article appears originally on CSO Online at: https://www.csoonline.com/article/3235510/security/the-future-of-cybersecurity-part-i-the-problem-of-complexity.html

It seems like CSOs are always seeing flashing red lights on their security dashboards these days, warning th...

Please reload

Recommended Reading
Search By Tags
Who's Behind The Blog

illumin808 is a blog dedicated to Cyber Counter Intelligence and Cybersecurity technologies. The posts will be a discussion of concepts and technologies that make up emerging threats and techniques related to Cyber Defense. Sometimes we get a little off-topic. Articles are gathered or written by cyber security professionals, leading OEMs, and enthusiasts from all over the world to bring an in-depth, real-world, look at Cyber Security.



About this blog illumin808 and any affiliate website does not represent or endorse the accuracy or reliability of any information’s, content or advertisements contained on, distributed through, or linked, downloaded or accessed from any of the services contained on this website, nor the quality of any products, information’s or any other material displayed, purchased, or obtained by you as a result of an advertisement or any other information’s or offer in or in connection with the services herein. Everything on this blog is based on personal opinion and should be interoperated as such. Contact Info If you would like to contact this blog, you may do so by emailing tony@illumin808.com

© illumin808