Sign up to join our weekly lunch & learns in August. Get all of the details at https://learning.gromancg.com/lunch-learn-sign-up/.
Check out our latest publication! In this paper we describe the way that attackers approach their mission and build their attack campaigns. The paper is written in plain english to appeal to the broadest audience possible without missing crucial technical points. You can download the paper at https://learning.gromancg.com/key-to-cyber-security-attacker-point-of-view/.
Today we are excited to announce that we have opened a wait list for those wanting to get in on the ground floor of our membership community and help drive the direction it goes. Please see our membership page for more details. Joining the wait list will give you exclusive visibility into the progress we …
Overview: There are over 1500 cryptocurrencies, and around 100 that have market capitalization greater than $100M. Any one of these could be a target for criminal groups that want to leverage companies’, governments’, and individuals’ computers to mine cryptocurrency and gain the rewards. And there is a direct correlation between the CPU processing power at …
Overview: Malware has evolved considerably over the past 20 years from the early viruses and internet worms to the sophisticated modular frameworks we list below. We try not to use the outdated terms like virus and worm, and instead describe malware by its purpose and technical attributes like infection vector and persistence mechanisms. We also …
Every major browser comes with a robust set of browser developer tools. In this micro course, we’ll show you how to use these to perform security testing to detect potential vulnerabilities and how to use some of the tools to attempt exploits as well.
We’ll cover the most important sources for open source intelligence that you should be aware of and monitoring. We’ll discuss the categories and types of information that is publicly available and we’ll provide some tips and guidance for collecting, storing and analyzing open source intelligence.
We’ll start from the original “smashing the stack” overflow and move in to other forms of memory buffer overflows and heap overflows and discuss return to libc and return oriented programming.
We’ll examine the types and categories of malware from exploit kits to cryptominers and ransomware to webshells while breaking down the moving parts and describing how they do what they do.
We’ll examine how attackers move and pivot through a network of computers and servers from their initial compromised machine until they complete their mission. We’ll cover the techniques that allow attackers to gain credentials to systems, elevate their privileges and remain in the network for months and sometimes years before being detected.