A Walk Down Adversary Lane - XP sp1

October 18, 2019

Python, IronPython, C#/.Net "OH MY" **SILENTTRINITY**

February 23, 2019

Measuring your Defenses for Reals...

October 28, 2018

The Evolving Threat - IoT Botnets

October 3, 2018

Memory Forensics – Process Analysis Part 1 of 2

March 19, 2018

1/4
Please reload

Please reload

Follow "THIS JUST IN"

February 23, 2019

I came across this interesting tool a few weeks ago called SILENTTRINITY.  Its a post-exploitation tool created in Python and leveraged IronPython and C# to accomplish Offensive tasks many Red Teamers and Penetration folks use PowerShell to complete.  So I created a qu...

October 28, 2018

So what’s the problem?  

I hate stating the obvious but in this blog I’m going to anyway.  Regardless of the advancements in security controls, attackers continue to successfully complete their cyber missions against organizations whether it’s to steal sensitive informa...

October 3, 2018

IoT Device

A widely used definition of the Internet of Things (IoT) is it that it is a network of physical devices, vehicles, structures and other objects - embedded with electronics, software, sensors, actuators, and network connectivity (they have an IP address) that...

March 19, 2018

In a previous blog (Memory Forensics 101) I talked high level about memory forensics in general and the use of Volatility.  In this blog I would like to walk through the various plugins you can use to analyze a memory image acquired from a machine infected with Kovter...

March 7, 2018

A quick conversation with Peter Burris for a CUBE Conversation at the CUBE Studios, Palo Alto.

March 5, 2018

What is it?

Most people know about traditional computer forensics where you analyze the artifacts on disk such as files, folders, registries, seen processes, etc.  You’re usually trying to find evidence that the computer has been compromised and what malicious actions h...

December 8, 2017

Heimdal PRO - the security solution for everyone 

The Internet is not a safe place to navigate without a security software product installed on your computer. And you need more than an antivirus or a good firewall solution to keep your data safe from all kind of cyber a...

November 1, 2017

In light of all the cyberattacks that have been well publicized as of late, we see the increasing need for skilled IT security resources to both protect against and respond to rapidly evolving cyber-threats. IT professionals tasked with protecting their companies’ cybe...

October 31, 2017

Lately there has been some articles and conversations around the security profession, particularly the ‘how to get started’ aspect. My good friend, Aamir Lakhani wrote a great article on getting started in cyber security (http://www.drchaos.com/getting-started-with-a-c...

October 26, 2017

Original article found at: https://www.csoonline.com/article/3203804/security/know-your-enemy-understanding-threat-actors.html

Sun Tzu wrote in his famous book, The Art of War, “If you know the enemy and know yourself, you need not fear the result of a hundred battles....

Please reload

Recommended Reading
Search By Tags
Who's Behind The Blog

illumin808 is a blog dedicated to Cyber Counter Intelligence and Cybersecurity technologies. The posts will be a discussion of concepts and technologies that make up emerging threats and techniques related to Cyber Defense. Sometimes we get a little off-topic. Articles are gathered or written by cyber security professionals, leading OEMs, and enthusiasts from all over the world to bring an in-depth, real-world, look at Cyber Security.

 

 

About this blog illumin808 and any affiliate website does not represent or endorse the accuracy or reliability of any information’s, content or advertisements contained on, distributed through, or linked, downloaded or accessed from any of the services contained on this website, nor the quality of any products, information’s or any other material displayed, purchased, or obtained by you as a result of an advertisement or any other information’s or offer in or in connection with the services herein. Everything on this blog is based on personal opinion and should be interoperated as such. Contact Info If you would like to contact this blog, you may do so by emailing tony@illumin808.com

© illumin808