This is a great write-up about LockBit 2.0 Ransomware!
Very interesting they are using NtQueryInformationFile() with "FileProcessIdsUsingFileInformation" with the goal of killing file lock holders
This is a more low level and evasive approach than using the Restart Manager API
We can house all refugees, not just the white ones.
We can lift all out of poverty, especially children.
We can work with dignity with flexibility & no commute.
What else have we seen proof of in the last couple of years of the lies of the white supremacist classist patriarchy?
Hey everyone. @Antisy_Training now has On-Demand training for many of our classes (and more to come!) On-Demand gets you lifetime access to all class updates.
We have an amazing start with some amazing instructors.
Check it out.
antisyphontraining.com/on-de…
This is the best synopsis of what happened, why I sued Microsoft seeking class action, why I dropped my individual lawsuit, & the white-hot generational fire that forged what I did next & will continue to do until I’m gone or until we have #payequitytheverge.com/22331972/pay-eq…
I had a mask on & walked into a jammed post office. A guy was leaving, approaching the doors as I entered. He looked at me & muttered loudly “Fucking sheep,” & I hollered back “Nobody wants to hear about your hobbies.” The entire PO exploded in laughter. A few folks clapped.
Anyone know of any entry level cybersecurity analyst jobs open? Cybersecurity community college grad (hell yeah!) looking to get their foot in the door somewhere!
Have you always wanted to give open source investigation a go, but don't know where to start? We've produced this easy to follow guide for beginners to help get you started: bellingcat.com/resources/202…
#DFIR Tip: Don't forget to check out the files sitting in `ProgramData\Microsoft\Windows\Power Efficiency Diagnostics\*`. These XML files are snapshotted daily and denote processes using high CPU cycles. See screenshot for a command to review process names/files.
Last chance to register for the first in-person run of my Linux Forensics training! If you're looking for a small class setting, this is going to be your best bet! kernelcon.org/training#linux…
1\ How to detect what command line spawned a process with no EDR/AV? 👀 #DFIR
If you have a memory sample, this is how you can figure out what cmd spawned the processes by using volshell and memory forensics.
STEP BY STEP GUIDE BELOW
👇 👇 👇 👇
#MemoryForensics
Thrilled to share my new blog post: Put an io_uring on it: Exploiting the Linux kernel. Follow me while I learn a new kernel subsystem + its attack surface, find an 0day, build an exploit, + come up with some new tricks. I go deep and demystify the process
graplsecurity.com/post/iou-r…