Blog

Recent Blog Posts

Understanding CVE-2020-0688

Hello, Guys! In this blog post we will take an in-depth look at CVE-2020-0688 which is a recently published vulnerability in Microsoft Exchange that allows an authenticated attacker to execute arbitrary code on affected Exchange Servers. The first section of this blog post is meant as a short introduction to...Read more...

WMI Persistence (T1084)

Hello, DFIR Folks! In this blog post we will take a quick look at how threat actors can utilize Windows Management Instrumentation (WMI) Event Consumers to obtain persistence on a compromised windows machine, and how we as Defenders can detect these kind of malicious activities by using PowerShell and the...Read more...

Battlefield Malware Analysis (Part 1)

Hello Folks! In this blog post series named "Battlefield Malware Analysis" we will be investigating different tools and techniques that you as a Malware Analysts / SOC Analyst / Incident Responder / (you name it) can use to make your life easier when dealing with Malware Analysis. The "Battlefield" aspect...Read more...

Do it yourself Privacy Phone

Who doesn’t know that feeling? You are frustrated because you have said the word “OK” and then all of a sudden the “Google Assistant” appears. You scroll through social networks and wonder why Facebook offers you the shoes you just talked about 5 minutes ago. Then you read another article...Read more...

Hello, World!

Digital Self-Defense Lab is virtual hackerspace established in november 2019 by a small group of volunteers. We aim to provide a virtual space for people to hack, create, learn, and explore in a safe, welcoming, and accessible environment. In comparison to traditional hackerspaces we don’t require our members to leave...Read more...