Hats Off Security
Because the victim doesn't care what colour hat the attacker was wearing. ============================ Uploading my brain to the Cloud for faster access
Skip to content
  • Home

Tag Archives: IoCs

Talking about RFC 9424 – Indicators of Compromise (IoCs) and Their Role in Attack Defence

Posted on September 6, 2023 by HatsOffSecurity

Discussing the newly published RFC 9424 and how IoCs can be used to build better defences, without relying on looking backwards. Continue reading →

Posted in Attack, Cyber, General, Hardening, Incident Response, Introduction, IoCs, Windows Forensics | Tagged basics, defence in depth, folder location, hats off security, How to apply IOCs, ioc lifecycle, IoCs, IoCs Explained, pyramid of pain, rfc 9424, RFC9424, scheduled task name, sha256, understanding RFC9424 | Leave a comment
  • Recent Posts

    • Talking about RFC 9424 – Indicators of Compromise (IoCs) and Their Role in Attack Defence
    • PowerShell Basic Introduction (Security Version)
    • Improving Technical Interviews
    • AnyDesk Forensic Analysis and Artefacts
    • Log4J/Log4Shell Video Glossary
    • HatsOffSecurity on YouTube
    • How to Create a Good Security CTF
    • NoScript Plugin Forensic Investigation – Firefox/ToR Browser
    • Keybase.io Forensics Investigation
    • When is Index.dat not Evidence of Browsing
  • Categories

    • anydesk
    • Attack
    • Browser Forensics
    • Brute force
    • Chrome
    • Competition
    • Competitions
    • Containment
    • Content Delivery Manager
    • Cookies
    • Cryptography
    • CTF
    • Cyber
    • Cyber Security Challenge
    • Decoding Time
    • Encrypted Traffic
    • Firefox
    • Forensic Readiness Plan
    • General
    • Google Analytics
    • Google Chrome
    • Google Rapid Response
    • Group Policy
    • GRR
    • Hardening
    • Heartbleed
    • Identification
    • Incident Response
    • Internet Explorer
    • Interviews
    • Introduction
    • IoCs
    • Jump Lists
    • Keybase
    • Link FIles
    • Linux Forensics
    • Memory Forensics
    • Microsoft Edge
    • My Two Cents
    • Network Analytics
    • Network Forensics
    • pass the hash
    • PCAP Analysis
    • Pen Testing
    • PowerShell
    • Preparation
    • Protocol
    • ReadyBoost
    • Research
    • Safari
    • SANS
    • Shared Folders
    • Shellshock
    • SMB
    • SSH
    • TOR
    • Uncategorized
    • USB Forensics
    • Windows Forensics
    • Windows Registry Forensics
    • Windows Registry Forensics
    • Windows Spotlight
    • Windows XP
    • Wireshark
  • CyberLinks

    • 3D Printing Cosplay and more
    • Cyber Security Challenge UK
    • SANS Security Training
    • Securitry Wizardry
  • Follow Hats Off Security on WordPress.com
  • November 2025
    M T W T F S S
     12
    3456789
    10111213141516
    17181920212223
    24252627282930
    « Sep    
  • Recent Posts

    • Talking about RFC 9424 – Indicators of Compromise (IoCs) and Their Role in Attack Defence
    • PowerShell Basic Introduction (Security Version)
    • Improving Technical Interviews
    • AnyDesk Forensic Analysis and Artefacts
    • Log4J/Log4Shell Video Glossary
  • Recent Comments

    Bianca the Baker's avatarBianca the Baker on NoScript Plugin Forensic Inves…
    Unknown's avatarWeek 40 – 2022… on PowerShell Basic Introduction…
    ALEX's avatarALEX on AnyDesk Forensic Analysis and…
    Unknown's avatarWeek 13 – 2022… on Improving Technical Interviews
    HatsOffSecurity's avatarHatsOffSecurity on AnyDesk Forensic Analysis and…
  • Archives

    • September 2023
    • September 2022
    • March 2022
    • February 2022
    • January 2022
    • May 2020
    • February 2020
    • August 2019
    • April 2019
    • October 2018
    • January 2018
    • October 2017
    • June 2017
    • March 2017
    • November 2016
    • May 2016
    • April 2016
    • March 2016
    • September 2015
    • July 2015
    • May 2015
    • April 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
    • October 2014
    • September 2014
    • August 2014
    • June 2014
    • May 2014
  • Categories

    • anydesk
    • Attack
    • Browser Forensics
    • Brute force
    • Chrome
    • Competition
    • Competitions
    • Containment
    • Content Delivery Manager
    • Cookies
    • Cryptography
    • CTF
    • Cyber
    • Cyber Security Challenge
    • Decoding Time
    • Encrypted Traffic
    • Firefox
    • Forensic Readiness Plan
    • General
    • Google Analytics
    • Google Chrome
    • Google Rapid Response
    • Group Policy
    • GRR
    • Hardening
    • Heartbleed
    • Identification
    • Incident Response
    • Internet Explorer
    • Interviews
    • Introduction
    • IoCs
    • Jump Lists
    • Keybase
    • Link FIles
    • Linux Forensics
    • Memory Forensics
    • Microsoft Edge
    • My Two Cents
    • Network Analytics
    • Network Forensics
    • pass the hash
    • PCAP Analysis
    • Pen Testing
    • PowerShell
    • Preparation
    • Protocol
    • ReadyBoost
    • Research
    • Safari
    • SANS
    • Shared Folders
    • Shellshock
    • SMB
    • SSH
    • TOR
    • Uncategorized
    • USB Forensics
    • Windows Forensics
    • Windows Registry Forensics
    • Windows Registry Forensics
    • Windows Spotlight
    • Windows XP
    • Wireshark
  • Meta

    • Create account
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.com
Hats Off Security
Blog at WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Subscribe Subscribed
    • Hats Off Security
    • Already have a WordPress.com account? Log in now.
    • Hats Off Security
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar