Skip to content
  • Posts
  • QRADAR
    • Useful Commands
    • Useful Information
    • AQL
  • Services
    • QRadar Services
  • Courses
  • Youtube
  • Contact
  • About Me
  • QRadar Rule Manager

Detections XYZ

Detection knowledge repository – by Daniel Koifman

  • Posts
  • QRADAR
    • Useful Commands
    • Useful Information
    • AQL
  • Services
    • QRadar Services
  • Courses
  • Youtube
  • Contact
  • About Me
  • QRadar Rule Manager
Saturday, March 07, 2026
Deconstructing “Wmiexec-Pro”
Research

Deconstructing “Wmiexec-Pro”

October 23, 2025

I recently ran a Kali VM against a Windows test host and instrumented the target with Procmon and WMI/Windows logs to see how a new WMI-native post-exploitation tool — Wmiexec-Pro — behaves. … Read More

Thoughts on the recent Ethereum smart contracts C2 abuse
Research

Thoughts on the recent Ethereum smart contracts C2 abuse

September 6, 2025

Hello all! 👋 It’s been a while since my last post. I wasn’t finding anything exciting to write about — until this story caught my attention. Recently, I came across an article … Read More

Detection Pitfalls You Might Be Sleeping On
Research

Detection Pitfalls You Might Be Sleeping On

May 12, 2025

Detection engineering isn’t just about finding bad behavior. It’s about understanding how attackers appear normal — on accident or by design.Some of the most successful evasion techniques don’t involve zero-days or encryption … Read More

Practical Cyber Deception — Introduction to “Chaotic Good”
Research

Practical Cyber Deception — Introduction to “Chaotic Good”

April 30, 2025

Ok, so before we start, I personally think this is a bit of an “offside” topic. While the tech exists, personally I am not familiar with orgs who actually implement … Read More

“Invoke-Shadow” — Applying Jungian Psychology to Detection Engineering
Research

“Invoke-Shadow” — Applying Jungian Psychology to Detection Engineering

April 8, 2025

“Until you make the unconscious conscious, it will direct your life — and you will call it fate.” — Carl Jung Before I begin this very odd post, let me … Read More

My 2025 Detection Philosophy and the Pursuit of Immutable Artifacts
Research

My 2025 Detection Philosophy and the Pursuit of Immutable Artifacts

March 24, 2025

If a log falls in the SIEM, does it generate an alert? 2025 has been an interesting year for me so far. Not too long ago, I joined a startup … Read More

Immutable Artifacts — Enabling RDP Connections
Research

Immutable Artifacts — Enabling RDP Connections

December 2, 2024

Building on my previous article, in this article we will adopt the “Immutable Artifacts” methodology to detect such artifacts for enabling/disabling RDP connections on a Windows machine. The registry architecture for RDP … Read More

Detecting WiFi dumping via direct WinAPI calls and introduction to “Immutable Artifacts”
Research

Detecting WiFi dumping via direct WinAPI calls and introduction to “Immutable Artifacts”

November 25, 2024

Lately I’ve been reading a LOT of materials on how to write better detection rules. The main reason this whole thing started is that I’ve had a very interesting thought. … Read More

Detection of “Evil-WinRM”
Research

Detection of “Evil-WinRM”

November 24, 2024

What is “evil-winrm”/WinRM? Evil-WinRM is a post-exploitation tool that provides a streamlined and efficient way to interact with Windows systems via Windows Remote Management (WinRM). It’s widely used in penetration … Read More

Detection of “PSExec.py”
Research

Detection of “PSExec.py”

October 28, 2024

What is Impacket / PSExec? Impacket PsExec is a Python-based implementation of the PsExec functionality, created by the open-source library Impacket. Impacket is a collection of tools and Python classes for working with network … Read More

Posts pagination

1 2 Next

Subscribe to get notified on new posts

Check your inbox or spam folder to confirm your subscription.

Proudly powered by WordPress | Theme: FreeNews | By ThemeSpiral.com.