TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Initial Access Operations Part 2: Offensive DevOps

BHIS · 2024-02-29 · Read original ↗

ATT&CK techniques detected

3 predictions
T1055.001Dynamic-link Library Injection
50%
"- resource hacker - many different. net obfuscation technologies and projects - syswhispers3 in addition, there are many fine individuals and companies who are kind enough to share blogs and articles about various development and evasion techniques. here is a list of various reso…"
T1055.001Dynamic-link Library Injection
42%
"should be noted that the underlying technologies employed in the pipeline are many and varied, including both published projects online, as well as software written here at black hills information security. in the process of developing evasive malware artifacts, there are many te…"
T1055.001Dynamic-link Library Injection
39%
"initial access operations part 2 : offensive devops initial access operations part 2 : offensive devops security consultant, malware researcher, new technology researcher evangelist. the challenge as stated in part 1 of this blog, the windows endpoint defense technology stack in …"

Summary

<p><img alt="" class="attachment-full size-full wp-post-image" height="720" src="https://www.blackhillsinfosec.com/wp-content/uploads/2024/02/BLOG_chalkboard_00658.png" width="1280" /></p> <p>The Challenge As stated in PART 1 of this blog, the Windows endpoint defense technology stack in a mature organization represents a challenge for Red Teamer initial access operations. For [&#8230;]</p> <p>The post <a href="https://www.blackhillsinfosec.com/initial-access-operations-part-2/">Initial Access Operations Part 2: Offensive DevOps</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security, Inc.</a>.</p>