NCC Group Research Blog
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study
9 months ago
Detecting Karakurt – an extortion focused threat actor
9 months ago
Detecting and Hunting for the PetitPotam NTLM Relay Attack
9 months ago
Detecting and Protecting when Remote Desktop Protocol (RDP) is open to the Internet
9 months ago
Detecting anomalous Vectored Exception Handlers on Windows
9 months ago
Derusbi: A Case Study in Rapid Capability Development
9 months ago
Detecting and Hunting for the Malicious NetFilter Driver
9 months ago
Demystifying Multivariate Cryptography
9 months ago
Denial of Service in Parsing a URL by ierutil.dll
9 months ago
Demystifying Cobalt Strike’s “make_token” Command
9 months ago
Demystifying AWS’ AssumeRole and sts:ExternalId
9 months ago
Defeating Windows DEP With A Custom ROP Chain
9 months ago
DeLux Edition: Getting root privileges on the eLux Thin Client OS
9 months ago
Deep Dive into Real-World Kubernetes Threats
9 months ago
Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server
9 months ago
Decoding network data from a Gh0st RAT variant
9 months ago
Decrypting OpenSSH sessions for fun and profit
9 months ago
DECTbeacon
9 months ago
Decoder Improved Burp Suite Plugin
9 months ago
Checked
6 hours 14 minutes ago