This paper focuses on using Windows APIs to exploit and bypass modern day defense systems. The idea here is to understand the approach of how a modern day threat adversary would definitely help blue teamers to improve their defense mechanism. This article is useful for both blue and red teamers.
a08987a70023a852cfeef5c85e21b3ba9fa78f1aa30066467583fa799fdca5e3
This paper is focused on the various ways in which threat hunting can be performed. It is based on the author's research of semi-automating the entire process by creating a tool based on machine learning and applying analytics.
6af7c1449c75828f7976e682efcd001d246afb3c611194a09d283daac934ebe6
This paper is focused on the Active directory attacks and various techniques which can be used by an attacker to abuse an AD environment in an enterprise network. This would also mark an introduction to Active directory along with its components. Topics covered include an introduction to Active Directory, Active Directory Structure, Multiple Attack Phases, Domain Persistence Techniques, Golden Ticket Attack, DCSync Attack, Silver Ticket Attack, and DSRM Attack techniques.
44a6dc0147aec02f155b590f92ed64b64954750c17a82f9750df4a42169a6b70
This is a brief whitepaper discussing the use of analytics when hunting for threats and notes some open source tools that can provide help.
18525786505ac237f2a1eb0774841f333bda5911afa3229941ffeb938eea4c77
This whitepaper details methodologies in relation to threat hunting.
b140c0a2d5b03908ec656abeeecb9c2639808c3de67bc648b07b4db3a813d8de
Whitepaper called Machine Learning - Learning Cybersecurity.
80ab2d27c57df335948cf2475c2f2b380fa6654de6e16605d2716820f2744441