𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
banner
netresec.com
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
@netresec.com
Experts in Network Forensics and Network Security Monitoring. Creators of #NetworkMiner, #CapLoader, PacketCache, #PolarProxy and RawCap.

Website: https://www.netresec.com/
Mastodon: @[email protected]
Thank you CISA, @ncsc.gov.uk, @bsi.bund.de et al. for publishing the advisory on Russian GRU Targeting Western Logistics Entities and Technology Companies. This list of mocking services is great for threat hunting!
www.cisa.gov/news-events/...
May 22, 2025 at 5:16 PM
NetworkMiner automatically extracts EML files as well as attachments (here a jpg image) to disk when it parses emails in SMTP, POP3 or IMAP traffic.
May 6, 2025 at 6:25 AM
That's a very useful feature! Thanks for sharing 🙏
February 24, 2025 at 10:20 AM
Here's a Wireshark display filter that detects this type of LLMNR (multicast name resolution) spoofing:

dns.​count.​answers > 0 and lower(dns.​qry.​name) != lower(dns.​resp.​name)
January 29, 2025 at 3:09 PM
December 18, 2024 at 6:14 PM
APT29 / Midnight Blizzard / Earth Koshchei use RDP relays to gain control of victims’ machines. One RDP config pretends to be for Regeringskansliet (Swedish Gov).
Thanks to @feikeh.bsky.social and @sjhilt.hilt.zip‬ for sharing indicators!
www.trendmicro.com/en_us/resear...
tria.ge/241023-qpfnl...
December 17, 2024 at 3:47 PM
The dropped bot (which?) uses the NKN peer-to-peer network to hide its C2 traffic.
December 6, 2024 at 11:24 AM
Downloaded a fresh pcap from any.​run to verify that #CapLoader identifies this traffic as ​Socks5Systemz backconnect ✅
app.any.run/tasks/c1b2dc...
December 5, 2024 at 3:35 PM
#Socks5Systemz backconnect traffic now uses TCP port 2024 (previously 2023)
infosec.exchange/@abuse_ch@io...
December 5, 2024 at 3:35 PM
Same vibe
December 4, 2024 at 11:50 AM
Here's another one with instructions from C2 server to download the next stage DLL.
Initial JS: 61dfc228a478f21326908f0231ff553c
Dropped DLL: c6ef634779facf10516f0dd6d0d1757c
app.any.run/tasks/8831ab...
November 28, 2024 at 9:51 AM
Nice malware lab setup using FLARE VM, #PolarProxy and #REMnux to decrypt and inspect TLS traffic.
www.koenmolenaar.nl/nl/write-ups...
November 28, 2024 at 9:20 AM
Two new Network Forensics training events!
🇪🇺 PCAP in the Morning Europe, March 4-7
🇺🇸 PCAP in the Morning US, March 25-28
netresec.com?b=23C9979
February 6, 2024 at 4:23 PM