Skip to content
  • Posts
  • QRADAR
    • Useful Commands
    • Useful Information
    • AQL
  • Services
    • QRadar Services
  • Courses
  • Youtube
  • Contact
  • About Me
  • QRadar Rule Manager

Detections XYZ

Detection knowledge repository – by Daniel Koifman

  • Posts
  • QRADAR
    • Useful Commands
    • Useful Information
    • AQL
  • Services
    • QRadar Services
  • Courses
  • Youtube
  • Contact
  • About Me
  • QRadar Rule Manager
Friday, May 16, 2025
Detection Pitfalls You Might Be Sleeping On
Research

Detection Pitfalls You Might Be Sleeping On

May 12, 2025

Detection engineering isn’t just about finding bad behavior. It’s about understanding how attackers appear normal — on accident or by design.Some of the most successful evasion techniques don’t involve zero-days or encryption … Read More

Practical Cyber Deception — Introduction to “Chaotic Good”
Research

Practical Cyber Deception — Introduction to “Chaotic Good”

April 30, 2025

Ok, so before we start, I personally think this is a bit of an “offside” topic. While the tech exists, personally I am not familiar with orgs who actually implement … Read More

“Invoke-Shadow” — Applying Jungian Psychology to Detection Engineering
Research

“Invoke-Shadow” — Applying Jungian Psychology to Detection Engineering

April 8, 2025

“Until you make the unconscious conscious, it will direct your life — and you will call it fate.” — Carl Jung Before I begin this very odd post, let me … Read More

My 2025 Detection Philosophy and the Pursuit of Immutable Artifacts
Research

My 2025 Detection Philosophy and the Pursuit of Immutable Artifacts

March 24, 2025

If a log falls in the SIEM, does it generate an alert? 2025 has been an interesting year for me so far. Not too long ago, I joined a startup … Read More

Immutable Artifacts — Enabling RDP Connections
Research

Immutable Artifacts — Enabling RDP Connections

December 2, 2024

Building on my previous article, in this article we will adopt the “Immutable Artifacts” methodology to detect such artifacts for enabling/disabling RDP connections on a Windows machine. The registry architecture for RDP … Read More

Detecting WiFi dumping via direct WinAPI calls and introduction to “Immutable Artifacts”
Research

Detecting WiFi dumping via direct WinAPI calls and introduction to “Immutable Artifacts”

November 25, 2024

Lately I’ve been reading a LOT of materials on how to write better detection rules. The main reason this whole thing started is that I’ve had a very interesting thought. … Read More

Detection of “Evil-WinRM”
Research

Detection of “Evil-WinRM”

November 24, 2024

What is “evil-winrm”/WinRM? Evil-WinRM is a post-exploitation tool that provides a streamlined and efficient way to interact with Windows systems via Windows Remote Management (WinRM). It’s widely used in penetration … Read More

Detection of “PSExec.py”
Research

Detection of “PSExec.py”

October 28, 2024

What is Impacket / PSExec? Impacket PsExec is a Python-based implementation of the PsExec functionality, created by the open-source library Impacket. Impacket is a collection of tools and Python classes for working with network … Read More

Detection of “EDRSilencer”
Research

Detection of “EDRSilencer”

October 18, 2024

Recently, there’s been quite a buzz in the infosec community about a new tool called “EDRSilencer”. From the tool’s Github description: “A tool uses Windows Filtering Platform (WFP) to block … Read More

My 2nd Udemy course “Detection-as-Code in IBM QRadar” is live. Grab it for free for a limited time!
Research

My 2nd Udemy course “Detection-as-Code in IBM QRadar” is live. Grab it for free for a limited time!

September 30, 2024

Hello all, Some of you may remember me from my first course “Modern IBM QRadar 7.5 Administration”. I recently created a new course and its now live on Udemy. This … Read More

Posts pagination

1 2 Next

Subscribe to get notified on new posts

Check your inbox or spam folder to confirm your subscription.

Proudly powered by WordPress | Theme: FreeNews | By ThemeSpiral.com.