Pinnedbob van der staakinInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 1My learnings on how the different steps in EDR and Antivirus techniques are used in the field.Oct 29, 2023Oct 29, 2023
Pinnedbob van der staakinInfoSec Write-upsStealthy Persistence While Using Windows Terminal.By misusing the setting fileNov 9, 2022Nov 9, 2022
bob van der staakinInfoSec Write-upsSecuring your malware from being hookedBy only allowing Microsoft signed DLL'sDec 23, 2023Dec 23, 2023
bob van der staakUnhooking EDR by remapping ntdll.dllBy Remapping ntdll from disk Dec 7, 20231Dec 7, 20231
bob van der staakinInfoSec Write-upsEvading Detection With Nmap Part 2Analyzing how Nmap -sV probes give your assessment awayNov 29, 20231Nov 29, 20231
bob van der staakinInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 3Reading into Direct Syscalls with Syswhispers.Nov 21, 2023Nov 21, 2023
bob van der staakinInfoSec Write-upsEvading Detection while using nmapUnderstanding how nmaplowercheck will give you awayNov 17, 2023Nov 17, 2023
bob van der staakinInfoSec Write-upsExploring Antivirus and EDR evasion techniques step-by-step. Part 2Common techniques for performing sandbox and Virtualmachine evasion by AV and EDRNov 11, 2023Nov 11, 2023
bob van der staakinInfoSec Write-upsTaking your web application pentesting to another levelBy making use of Bchecks in Burp suiteAug 13, 2023Aug 13, 2023
bob van der staakinInfoSec Write-upsRewriting IP for filter bypassIpv4 addresses are built as 4 blocks of integers which can range from 0 to 255. If we want to ping localhost we are used to write 127.0.0.1…Aug 10, 2023Aug 10, 2023