RSS.Social

@inversecos

follow: @[email protected]

Posts

An inside look at NSA (Equation Group) TTPs from China’s lense

Understanding Tokens in Entra ID: A Comprehensive Guide

Detecting Lateral Movement in Entra ID: Cross Tenant Synchronization

Azure Command Line Forensics - Host Based Artifacts

Detecting Fake Events in Azure Sign-in Logs

How to Detect Malicious OAuth Device Code Phishing

Recovering Cleared Browser History - Chrome Forensics

How to Investigate Insider Threats (Forensic Methodology)

Forensic Detection of Files Deleted via SDelete

How to Detect OAuth Access Token Theft in Azure

Detecting Linux Anti-Forensics: Timestomping

Hunting for APT Abuse of Exchange

Heap Overflows on iOS ARM64: Heap Spraying, Use-After-Free (Part 3)

Detecting Linux Anti-Forensics Log Tampering

Guide to Reversing and Exploiting iOS binaries Part 2: ARM64 ROP Chains

How to Reverse Engineer and Patch an iOS Application for Beginners: Part I

How to Perform Clipboard Forensics: ActivitiesCache.db, Memory Forensics and Clipboard History

Detection and Compromise: Azure Key Vaults & Secrets

Defence Evasion Technique: Timestomping Detection – NTFS Forensics

Malicious Registry Timestamp Manipulation Technique: Detecting Registry Timestomping

Windows Event Log Evasion via Native APIs

How to Detect and Compromise Azure Blobs and Storage Accounts

How to Detect Malicious Azure Persistence Through Automation Account Abuse

How to Detect Azure Active Directory Backdoors: Identity Federation

How to Backdoor Azure Applications and Abuse Service Principals