neonprimetime security , just trying to help

Tuesday, October 27, 2015

Registry Shell\BagMRU Key

›
If you've ever looked through a memory dump and noticed the following registry key getting modified, here's my take on what it's...

Registry Explorer\UserAssist Key

›
If you've ever looked through a memory dump and noticed the following registry key getting modified, here's my take on what it's...
Monday, October 26, 2015

Walking Thru a Phishing Email Attachment

›
Here's a walk-thru of how I look at a Phishing Email Attachment. There was a McAfee alert 'HTML/Phishing.b' on a file called ...
Monday, October 19, 2015

Exploit Kits 101

›
This Trend Micro White paper on Exploit kits was a good read. It gives an easy to understand explanation of how exploit kits are currently...
Monday, October 12, 2015

SIP (VoIP) Packets from sipvicious

›
Have you ever seen traffic looking like this against your networK? The protocol is SIP, the Destination Port is 5060, UDP, it's a Req...

Finding Windows Files that Changed

›
Many times in the information security world it's necessary to see what files changed on a system. One possible way to do that is compar...

Find Hidden Website Folders

›
Here's a simple tool that can find Hidden/Common Website Folders that might not have a link directly to them from the main page. Downlo...
‹
›
Home
View web version
Powered by Blogger.