Deconstructing โWmiexec-Proโ
I recently ran a Kali VM against a Windows test host and instrumented the target with Procmon and WMI/Windows logs to see how a newโฆ
New post out! "Deconstructing Wmiexec-pro"
Technical deep dive into a new post-exploitation framework based on Impacket's wmiexec, including a bunch of new telemetry and detections. Check it out > koifsec.medium.com/deconstructi...
23.10.2025 15:30 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
๐ฆ๐ฒ๐ฒ๐ถ๐ป๐ด ๐๐ผ๐บ๐ฒ ๐๐ฒ๐ฐ๐ฟ๐ฒ๐๐๐ฑ๐๐บ๐ฝ ๐ฎ๐ฐ๐๐ถ๐๐ถ๐๐ ๐ถ๐ป ๐๐ต๐ฒ ๐๐ถ๐น๐ฑ ๐น๐ฎ๐๐ฒ๐น๐, ๐ฎ๐ป๐ฑ ๐ถ๐โ๐ ๐๐ฟ๐ถ๐ฐ๐ธ๐ ๐๐ผ ๐ฐ๐ฎ๐๐ฐ๐ต ๐ฏ๐ฒ๐ฐ๐ฎ๐๐๐ฒ ๐ผ๐ณ ๐ฎ๐น๐น ๐๐ต๐ฒ ๐ณ๐ฎ๐น๐๐ฒ ๐ฝ๐ผ๐๐ถ๐๐ถ๐๐ฒ๐.
The recent NetExec update (codename SmoothOperator) pushed me to share this one ๐
๐ www.netexec.wiki/news/v1.4.0-...
๐๐ถ๐ฟ๐๐ ๐ฒ๐๐ฒ๐ป๐ (๐ฐ๐ฒ๐ณ๐ฎ)
Special privileges assigned to new logon:
22.10.2025 04:36 โ ๐ 4 ๐ 1 ๐ฌ 1 ๐ 0
Detecting Abuse of OpenEDRโs Permissive EDR Trial: A Security Researcherโs Perspective
1. Introduction
๐ฅ๐ฒ๐ฎ๐ฑ ๐๐ต๐ฒ ๐ณ๐๐น๐น ๐ฎ๐ฟ๐๐ถ๐ฐ๐น๐ฒ: kostas-ts.medium.com/detecting-ab...
๐ฆ๐ถ๐ด๐บ๐ฎ ๐ฃ๐ฅ: github.com/SigmaHQ/sigm...
๐'๐ฑ ๐น๐ผ๐๐ฒ ๐๐ผ ๐ต๐ฒ๐ฎ๐ฟ ๐๐ผ๐๐ฟ ๐๐ต๐ผ๐๐ด๐ต๐๐:
โข Have you encountered similar permissive trial access in other security platforms? We need to document things before it's too late.
Hope you enjoy reading the post!
22.10.2025 14:33 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
1/
In today's BEC (Business E-Mail Compromise) case, I stumbled (again) over the "Set-MailboxJunkEmailConfiguration" operation. I talked about it a while back. [1]
The attacker also created a new Inbox rule for moving incoming emails for target personnel to a designated folder.
27.09.2025 07:42 โ ๐ 4 ๐ 2 ๐ฌ 1 ๐ 0
PDF.pdf
Sharing the slides from our latest "2025 State of Detection Workshop" !
drive.google.com/file/d/18Q-E...
22.08.2025 13:47 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
A rather interesting choice of technique to use a renamed legitimate schtasks. Quite easy to detect by writing a rule that searcher "/create " + "/tn " + "/sc " + "/tr " !
28.07.2025 05:02 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Creators of BloodHound | Experts in Adversary Tradecraft | Leaders in Identity Attack Path Management
Threat researcher at Trend Micro mostly focused on APT
Managed endpoint protection, detection and response designed to help the 99% fight back against todayโs cybercriminals.
CTO @TrustedSec.com | Former Optiv/SecureWorks/Accuvant Labs/Redspin | Race cars
@Defcon604 Admin. @VanCitySec Organizer.
DFIR @Mandiant (@GoogleCloud). He/Him.
I play with vulnerabilities and exploits.
While this site initially showed promise, I've grown tired with its lack of improvement.
You'll find me @wdormann@infosec.exchange on Mastodon.
Defcon goon, Adversarial Architect. Photography, Driving, Blog and general purveyor of chaos. Metal/DnB Fan
Will Google It For You For Swag
๐ฌ๐ง | Senior Threat Intelligence Advisor at Team Cymru | Co-author SANS FOR589 | Co-founder Curated Intel
@volatilityfoundation.org Core Dev | Art of Memory Forensics co-author | DFIR trainer and enthusiast | Director of Adversary Tactics @huntress.com
I enjoy security, technology, learning, books, & the great outdoors.
Trying to be human & kind.
Opinions = mine. He/Him/Hรคn
https://github.com/JimSycurity
https://www.adminsdholder.com
๐-Team Hacker
Training the next generation of purple team hackers
(he/him)
https://maikroservice.com/email
Privacy, motorcycle, and craft beer geek. Adversarial thinker. Blue team your blue team for better red teaming.
Loves Jesus, loves others | Husband, father of 4, security solutions architect, love to learn and teach | Microsoft MVP | @TribeOfHackers | ๐infosec.exchange@nathanmcnulty
- pentester/recovering sysadmin
- Ethical Threat
- Active Directory Security Connoisseur
- offensive stuff > securit360.com
- Host Cyber Threat POV > offsec.blog
- SWAG > swag.ethicalthreat.com
- free newsletter > https://click.spenceralessi.com/mylinks
- Dad of two <3
- Co-founder Recon InfoSec
- SANS DFIR Instructor
- BlackHat Trainer
- IANS Faculty
- Trainer @digitaldefenseinstitute.com
- Blog: https://blog.ecapuano.com
- โฌก ODESZA, Lane 8, Kasbo ๐ง
- โค @whit.zip
SpyCloud - Director of Security Research, Cryptolaemus Coordinator, Emotet(Ivan)/QBot(Boris) Destroyer, gold prospector & former sysadmin.
CSO @ TrustedSec | Music | Tattoos | H@x | Rad Memes
Cybersecurity, Battletech, and Sci-Fi.