Dan LussierChronicle Detection As Code with Google IDX and GitHubAfter recently reading the awesome two-part series by David French (part 1 and part 2) I decided to take his work for a spin. I identified…Feb 20Feb 20
Dan LussierHashed and rehashed a tale of Goodware hashesI was looking for a service that offered goodware hashes for a project related to SOAR automation, but I couldn’t find one. So, I decided…Oct 29, 2023Oct 29, 2023
Dan LussierDetecting Malicious C2 Activity — SpawnAs & SMB Lateral Movement in CobaltStrikeUnderstanding common attack vectors and how threat actors move in your environment post-compromise is critical to identifying what kind of…Jan 15, 2021Jan 15, 2021
Dan LussierDetecting Malicious C2 Activity with EDR TelemetryInvestigating post-compromise activity, be it simulated or real, with EDR logs can be extremely beneficial to building out advanced…Jan 2, 2021Jan 2, 2021