Silencing the EDR SilencersOriginally posted: Silencing the EDR Silencers | Huntress (huntress.com) authored by me.Oct 31Oct 31
What the Fork: Exploring Telemetry Gaps in Microsoft’s 4688 EventOriginally posted: What the Fork: Exploring Telemetry Gaps in Microsoft’s 4688 Event | Prelude (preludesecurity.com) but authored by me.Apr 4Apr 4
Event Tracing for Windows (ETW): Your Friendly Neighborhood IPC MechanismOriginally posted: Event Tracing for Windows (ETW): Your Friendly Neighborhood IPC Mechanism | Prelude (preludesecurity.com) but authored…Apr 4Apr 4
Uncovering Adversarial LDAP TradecraftA Write-Up by TrustedSec’s Research Lead Carlos Perez and Binary Defense’s Research Lead Jonathan Johnson. Originally posted on the Binary…Dec 18, 2023Dec 18, 2023
Mastering Windows Access Control: Understanding SeDebugPrivilegeOriginally posted on the Binary Defense page, but was authored by me.Dec 18, 2023Dec 18, 2023
The Client/Server Relationship — A Match Made In HeavenThis blog is written by Jonny Johnson, Senior Researcher of Adversarial Techniques and Capabilities at Binary Defense, and co-authored…Oct 11, 2023Oct 11, 2023