AuthorAhmed Kasmani

A Story of Persistance – Windows Part 2

A

This is the second part, first part is here. Malwares use persistence mechanisms to keep access on a system across restarts. Mitre Att&ack talks about Persistence as a tactic, and all the persistence mechanisms are the techniques. The way the articles will flow is the same as the first article: Name and some details of the persistence mechanism.How it works.Threat actors or malware...

A Story of Persistance – Windows Part 1

A

For a while I wanted to do a series of blog posts where I discuss the different types of persistence mechanisms in Windows, Linux and MacOS. Some procrastination has had the better of me. This is the first part, hopefully more to come. I am going to try and add some more pertinent details. Malwares use persistence mechanisms to keep access on a system across restarts. Mitre Att&ack talks...

Home LAB for Security Research

H

In my first post, I want to talk about the setup for the homelab. As an InfoSec consultant it is imperative to have some semblance of a homelab. It serves as a playground for all things you want to learn and go deep into. Introduction My experience with setting up a homelab, has had its ups and down. Before moving to Australia my homelab was my beefed up MacBook Pro i7 – 16GB RAM and 1TB...

Recent Posts

Recent Comments