Galloping through logs like a glittery SIEM stallion.
2025-05-22
During my exploration of offensive techniques, I’ve always been particularly interested in abuses of built-in Windows mechanisms. One such technique involves Background Intelligent Transfer Service (BITS) Jobs. For a solid overview of its relevance in cybersecurity, see the MITRE ATT&CK page for...
2025-05-19
This is the start of something big: a blog about breaking things, defending them, and hunting unicorns in the logs. 1Testing code block ...