neonprimetime security , just trying to help
Tuesday, October 27, 2015
Registry Shell\BagMRU Key
›
If you've ever looked through a memory dump and noticed the following registry key getting modified, here's my take on what it's...
Registry Explorer\UserAssist Key
›
If you've ever looked through a memory dump and noticed the following registry key getting modified, here's my take on what it's...
Monday, October 26, 2015
Walking Thru a Phishing Email Attachment
›
Here's a walk-thru of how I look at a Phishing Email Attachment. There was a McAfee alert 'HTML/Phishing.b' on a file called ...
Monday, October 19, 2015
Exploit Kits 101
›
This Trend Micro White paper on Exploit kits was a good read. It gives an easy to understand explanation of how exploit kits are currently...
Monday, October 12, 2015
SIP (VoIP) Packets from sipvicious
›
Have you ever seen traffic looking like this against your networK? The protocol is SIP, the Destination Port is 5060, UDP, it's a Req...
Finding Windows Files that Changed
›
Many times in the information security world it's necessary to see what files changed on a system. One possible way to do that is compar...
Find Hidden Website Folders
›
Here's a simple tool that can find Hidden/Common Website Folders that might not have a link directly to them from the main page. Downlo...
‹
›
Home
View web version