VPN Solution Security TestingIn April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution... KNOWLEDGE CENTER Case Study LIFARS Pen Testing Team LIFARS Tech Diary Session hijacking attack What is Session Hijacking? Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems... Advanced Persistent Threat APT41 APT41 – A spy who steals or a thief who spies Case Study Cyber indictments cases LIFARS Tech Diary nation-state actor becomes a cybercriminal Spy Who Encrypted Me APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Forensic Analysis of Windows Shellbags Investigative Value of Windows ShellBags LIFARS Tech Diary Whitepaper Windows ShellBags Forensics Windows ShellBags Forensics, Investigative Value of Windows ShellBags April 2, 2020 Windows ShellBags are one of the well-known and valuable sources of information regarding computer system’s user behavior. Although their primary... Effective Measures to Prevent Phishing Attacks Fortification of Your Human Cyber Defenses Phishing Attack Simulations Phishing is a social engineering technique Whitepaper Phishing Attack Simulations and Effective Preventative Measures March 25, 2020 Fortification of Your Human Cyber Defenses. The explanation of new and old ways of phishing attacks and recommendations for effective... Case Study Cyber Incident Response Tools Data Breach Response evil corp Incident Response Retainer LIFARS Tech Diary Osquery for Cyber Incident Response Osquery for Cyber Threat Detection and DFIR Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we... Case Study Extract used plaintext passwords How to Crack Password LIFARS Password Cracking Password Cracking Password Cracking Case Study LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former... Case Study Technical Tools Voltaire - Open Source Tool for Cyber Incident Response What does Voltaire/Voila do? What is Voltaire/Voila? Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it... IOC Checker Scans for indicators of compromise Technical Tools IOC Checker March 5, 2020 What is it? Scans for indicators of compromise (IOCs) Full stack application CLI client + Backend + Web admin console... Evaluate Potential Exploits Network Penetration Test Device Configuration Technical Tools Virus Checker Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan... Cybersecurity Essentials Guide For Law Enforcement Cybersecurity Recommendations for Law Enforcement LIFARS Cybersecurity Essentials Technical Guide LIFARS Cybersecurity Essentials Guide – Recommendations for Law Enforcement February 28, 2020 Cybersecurity Essentials Guide For Law Enforcement. Basic cyber security practices – personnel. There are basic cyber hygiene practices that should... hardening steps to make Windows 10 secure. how to secure Windows 10 Technical Guide windows 10 hardening Windows 10 security Windows 10 Hardening-Non-Enterprise Environment February 25, 2020 A security guide on how to secure Windows 10 for non-enterprise environment. Hardening is performed using mostly native Windows tools... Case Study Cyber Resilience Experts internet facing infrastructure LIFARS Pen Testing Team Man-in-the-middle (MiTM) attacks NAC Bypass and ARP Spoofing NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Case Study Cisco and Fortinet Hacking Cisco Hacking Cyber Resilience Experts Fortinet FortiOS Fortinet Hacking penetration tests evaluating Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Case Study Cyber Resilience Experts Fortune 500 company implemented security measures Phishing Test send out phishing emails Case Study – Phishing Test January 29, 2020 Phishing test to ensure implemented security measures remain effective. LIFARS regularly conducts phishing tests, in addition to penetration tests to...
VPN Solution Security TestingIn April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution...
KNOWLEDGE CENTER Case Study LIFARS Pen Testing Team LIFARS Tech Diary Session hijacking attack What is Session Hijacking? Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems... Advanced Persistent Threat APT41 APT41 – A spy who steals or a thief who spies Case Study Cyber indictments cases LIFARS Tech Diary nation-state actor becomes a cybercriminal Spy Who Encrypted Me APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Forensic Analysis of Windows Shellbags Investigative Value of Windows ShellBags LIFARS Tech Diary Whitepaper Windows ShellBags Forensics Windows ShellBags Forensics, Investigative Value of Windows ShellBags April 2, 2020 Windows ShellBags are one of the well-known and valuable sources of information regarding computer system’s user behavior. Although their primary... Effective Measures to Prevent Phishing Attacks Fortification of Your Human Cyber Defenses Phishing Attack Simulations Phishing is a social engineering technique Whitepaper Phishing Attack Simulations and Effective Preventative Measures March 25, 2020 Fortification of Your Human Cyber Defenses. The explanation of new and old ways of phishing attacks and recommendations for effective... Case Study Cyber Incident Response Tools Data Breach Response evil corp Incident Response Retainer LIFARS Tech Diary Osquery for Cyber Incident Response Osquery for Cyber Threat Detection and DFIR Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we... Case Study Extract used plaintext passwords How to Crack Password LIFARS Password Cracking Password Cracking Password Cracking Case Study LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former... Case Study Technical Tools Voltaire - Open Source Tool for Cyber Incident Response What does Voltaire/Voila do? What is Voltaire/Voila? Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it... IOC Checker Scans for indicators of compromise Technical Tools IOC Checker March 5, 2020 What is it? Scans for indicators of compromise (IOCs) Full stack application CLI client + Backend + Web admin console... Evaluate Potential Exploits Network Penetration Test Device Configuration Technical Tools Virus Checker Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan... Cybersecurity Essentials Guide For Law Enforcement Cybersecurity Recommendations for Law Enforcement LIFARS Cybersecurity Essentials Technical Guide LIFARS Cybersecurity Essentials Guide – Recommendations for Law Enforcement February 28, 2020 Cybersecurity Essentials Guide For Law Enforcement. Basic cyber security practices – personnel. There are basic cyber hygiene practices that should... hardening steps to make Windows 10 secure. how to secure Windows 10 Technical Guide windows 10 hardening Windows 10 security Windows 10 Hardening-Non-Enterprise Environment February 25, 2020 A security guide on how to secure Windows 10 for non-enterprise environment. Hardening is performed using mostly native Windows tools... Case Study Cyber Resilience Experts internet facing infrastructure LIFARS Pen Testing Team Man-in-the-middle (MiTM) attacks NAC Bypass and ARP Spoofing NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Case Study Cisco and Fortinet Hacking Cisco Hacking Cyber Resilience Experts Fortinet FortiOS Fortinet Hacking penetration tests evaluating Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Case Study Cyber Resilience Experts Fortune 500 company implemented security measures Phishing Test send out phishing emails Case Study – Phishing Test January 29, 2020 Phishing test to ensure implemented security measures remain effective. LIFARS regularly conducts phishing tests, in addition to penetration tests to...
Case Study LIFARS Pen Testing Team LIFARS Tech Diary Session hijacking attack What is Session Hijacking? Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems...
Advanced Persistent Threat APT41 APT41 – A spy who steals or a thief who spies Case Study Cyber indictments cases LIFARS Tech Diary nation-state actor becomes a cybercriminal Spy Who Encrypted Me APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of...
Forensic Analysis of Windows Shellbags Investigative Value of Windows ShellBags LIFARS Tech Diary Whitepaper Windows ShellBags Forensics Windows ShellBags Forensics, Investigative Value of Windows ShellBags April 2, 2020 Windows ShellBags are one of the well-known and valuable sources of information regarding computer system’s user behavior. Although their primary...
Effective Measures to Prevent Phishing Attacks Fortification of Your Human Cyber Defenses Phishing Attack Simulations Phishing is a social engineering technique Whitepaper Phishing Attack Simulations and Effective Preventative Measures March 25, 2020 Fortification of Your Human Cyber Defenses. The explanation of new and old ways of phishing attacks and recommendations for effective...
Case Study Cyber Incident Response Tools Data Breach Response evil corp Incident Response Retainer LIFARS Tech Diary Osquery for Cyber Incident Response Osquery for Cyber Threat Detection and DFIR Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we...
Case Study Extract used plaintext passwords How to Crack Password LIFARS Password Cracking Password Cracking Password Cracking Case Study LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former...
Case Study Technical Tools Voltaire - Open Source Tool for Cyber Incident Response What does Voltaire/Voila do? What is Voltaire/Voila? Voltaire – New Tool for Cyber Incident Response from LIFARS March 10, 2020 What is Voltaire/Voila? At LIFARS, we process memory images as part of our incident response process. In these cases, it...
IOC Checker Scans for indicators of compromise Technical Tools IOC Checker March 5, 2020 What is it? Scans for indicators of compromise (IOCs) Full stack application CLI client + Backend + Web admin console...
Evaluate Potential Exploits Network Penetration Test Device Configuration Technical Tools Virus Checker Virus Checker March 3, 2020 Virus Checker – External network & internal network penetration test device configuration review. What is it? Antivirus aggregation engine Scan...
Cybersecurity Essentials Guide For Law Enforcement Cybersecurity Recommendations for Law Enforcement LIFARS Cybersecurity Essentials Technical Guide LIFARS Cybersecurity Essentials Guide – Recommendations for Law Enforcement February 28, 2020 Cybersecurity Essentials Guide For Law Enforcement. Basic cyber security practices – personnel. There are basic cyber hygiene practices that should...
hardening steps to make Windows 10 secure. how to secure Windows 10 Technical Guide windows 10 hardening Windows 10 security Windows 10 Hardening-Non-Enterprise Environment February 25, 2020 A security guide on how to secure Windows 10 for non-enterprise environment. Hardening is performed using mostly native Windows tools...
Case Study Cyber Resilience Experts internet facing infrastructure LIFARS Pen Testing Team Man-in-the-middle (MiTM) attacks NAC Bypass and ARP Spoofing NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Case Study Cisco and Fortinet Hacking Cisco Hacking Cyber Resilience Experts Fortinet FortiOS Fortinet Hacking penetration tests evaluating Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Case Study Cyber Resilience Experts Fortune 500 company implemented security measures Phishing Test send out phishing emails Case Study – Phishing Test January 29, 2020 Phishing test to ensure implemented security measures remain effective. LIFARS regularly conducts phishing tests, in addition to penetration tests to...