Skip to main content

InQuest Blog

Posted on 2020-03-18 by Amirreza Niakanlahiji and Pedram Amini
In this post, we provide a detailed analysis of an interesting Excel 4.0 XLM macrosheet maldoc distribution campaign that is tied to a variety of executable payloads, a subject matter we'll be covering in a future blog. As of the time of writing, detection rates for this class of attack are relatively low, and these samples happily bypass the internal GSuite and O365 protection mechanisms.
Posted on 2020-02-25 by Josiah Smith
Our CTO, Pedram Amini, and colleague Ero Carrera have open-sourced all the materials from a two-day reverse engineering class they taught over the years at BlackHat, the last instance being at Blackhat 2009 Federal. Written in LaTeX + Beamer, the course materials can be rendered in both slideshow (PDF) and article (PDF) modes. Additionally, the courseware includes malware samples and all requisite references, scripts, tools, exercises, and solutions.
Posted on 2020-02-24 by Samuel Kimmons
Samuel Kimmons is a Lead Cyber Threat Emulator/Red Teamer and Penetration Tester at the United States-Air Force Computer Emergency Response Team (US-AFCERT). In his guest blog, he discusses LoLBins or Living Off the Land Binaries to get PowerShell without PowerShell.
Posted on 2020-01-23 by Josiah Smith
An illustrative blog discussing the Pyramid of Pain and how it relates to the Iceberg of Inspection. Deep File Inspection can uncover TTPs and other indicators to supplement prevention, detection, and threat hunting within your network.
Posted on 2020-01-22 by Adam Musciano
A heartfelt retrospective from one of the InQuest Interns detailing his experiences and contributions.

Blog Archive