top of page

STUFF I'VE WRITTEN

You can scroll down for some screenshots too

2025
 

Webinars

Media comments

  • Comment on the security risks from the TikTok/Rednote transfers [12]

  • Comment on Apple Encryption downgrade as requested by UK Gov [1, 2]

  • Comment on security for critical national infrastructure [1]

  • Comment on rumoured Cisco compromise [1]

  • Comment on phishing for Forbes [1]

  • Comment on Infostealers [1]

  • Comment on S3 bucket compromise [1]

  • Comment on efficacy of emoji-based credentials [1]

  • Comment on Zacks investment compromise [1]

Blogs

  • Untold Tales from Tactical Response [1]

​​

2024

Webinars

​​

Cleo CVE-2024-55956

  • Contributed to blog

  • Had social media posts for technical analysis tips [12]

​

ScreenConnect `Slash & Grab` CVE-2024-1709 & CVE-2024-1708

​

Fortigate's CVE-2023-48788

  • Shared DFIR investigation notes [1, 2]

​

Most Threat Actors Aren't Sophisticated

​

Twitter Threads

I like using Twitter threads to share real attack data, or defensive and investigative techniques

  • Adversaries attempting to cover their tracks [1]

  • Neutralising a RDP-brute force and enumeration intrusion [1]

  • Leveraging the Huntress SIEM [1]

  • Threat hunting via SIEM [1]

2023

Webinars:​

​

Conferences:

​

Podcasts:

​

MOVEit Transfer 0day

One of the Huntress investigators for the MOVEit Transfer 0day, we also were amongst the first in the community to begin sharing details and response guidance

​

M365 and Azure investigations

A number of blogs on our investigations in m365/Azure world​

  • Blog one on investigation into a series of compromises across multiple networks

  • Blog two on leveraging anomalous user-agents in M365 telemetry to conduct threat hunts

​

Addressing Initial Access

Short blog with Harlan Carvey on how to engineer defence-in-depth against common initial access techniques involving OneNote malware, macro malware, and ISO mounting

  • You can find the article here

​

The Methods Behind a Huntress Managed Antivirus Investigation

Following how a Defender alert instigates an investigation involving Event Logs, and ending with tips on how to communicate findings in a report

​

Registry Collection Script

Made with Harlan Carvey and John Hammond, a simple PowerShell script to automate collection of important Registry hives, Amcache, and each user's NTUSER and UsrClass .dats

​

Media Comments

​

Twitter Threads

I like using Twitter threads to share real attack data, or defensive and investigative techniques

  • Suspicious M365 User agent hunt [1]

  • Lateral movement [1]

  • Persistent obfuscation [1]

  • Catching failed evasion [1]

  • Sysmon for rapid malware analysis [1]

  • OneNote Malware [1, 2]

  • Summarising Remote Desktop Gateway intrusion investigation [1]

  • Jumplist forensics to solve problems [1]

  • Pulling scheduled task data out of the Registry [1]

  • Qakbot tracking [1]

  • Leveraging alternate logs when threat actors wipe the standard security event logs [1, 2

  • Detections based on execution from anomalous directories [1]

2022

Webinars:

​

Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY

Article on a novel, malicious credential technique that was previously thought to only be theoretical. We encountered this in the wild whilst investigating a ransomware intrusion. 

This article had some wonderful interaction on Twitter [1, 2, 3, 4], as well as some discussion on Youtube [5]

​

Defense Evasion series

Three-part series on what defense evasion is and how to architect foundational security to catch adversarial techniques

  1. What Is Defense Evasion?

  2. The Mechanics of Defense Evasion

  3. Defense Evasion: Defenders Strike Back!

​

Evicting the Adversary

How to kick out an active attacker is a gap I've noticed in many blue team guides that advise monitoring and detections. This article addresses that with granular guidance on ejecting an attacker

This article generated some interaction on Twitter [1, 2], and made it onto a podcast or two [3]

This article made it into Ollie Whitehouse's security news

​

Accidental detection ProxyNotShell variant

When sharing data from a recent intrusion we had worked, CrowdStrike researchers took a puzzle piece we had and identified we had in fact found a new variant exploit for CVE-2022-41080 and CVE-2022-41082  [1, 2, 3]

​

Media Comments 

​

Contributions to WTFbins

Encyclopedia of false positive activities that Defenders may encounter

​

Twitter Threads

  • Answering Chris Sanders' thoughts on how to investigate a mounted ISO alert [1]

  • Hunting adversaries who use the same directories [1]

  • Thoughts on detecting Winexesvc [1]

  • Overcoming security silos make your investigations better [1]

  • Security solutions and starting your intrusion investigation [1]

  • Unexpected Logon Types for RDP brute forcing [1, 2]

  • Unravelling a Cobalt Strike beacon [1, 2]

  • Defeating Suborner [1]

  • Leveraging the forensic data from security solutions [1 , 2]

  • Investigating false positives and circulating your findings to the infosec community [1, 2]

  • Web Browser Forensic Investigations [1 , 2]

  • Leveraging Velociraptor, Kape, Sigma, Chainsaw, and Security Onion to rapidly detect evil in Windows Event Logs [1 , 2]

  • Reverse engineering and monitoring an AMSI & ETW bypass [1, 2]

  • Monitoring and hunting for LNK -> EXE  [1 , 2]

​

Sysmon streamliner

Script to spin up Sysmon with Florian Roth's ruleset, and then deploy Ippsec's Sysmon grepper that extracts IoCs

2021

No Logs? No Problem! Incident Response without Windows Event Logs

In this article I share a number of easy-to-deploy digital forensics techniques I've found helpful during an investigation, when the logs have been burned

This article generated some interaction on Twitter [1, 2, 3]

I was also grateful to appear once again in Ollie Whitehouse's security news

​

PowerShell Jobs

This article was inspired by an adversaries' malicious PowerShell technique I found during an incident response. 

This article made it into Ollie Whitehouse's security news

​

The Science Behind Cyber Security

A scientific lens to the philosophy, practices, and solutions in the infosec world

Comment for IoT Vulnerabilities

The Daily Swig kindly requested I offer some perspective on some significant Realtek vulnerabilities that affected a load of IoT devices.

Windows’ Registry Run Keys

Here I wrote about an obscure feature of the Windows registry that could gift an adversary sneaky persistence. 

The article was referenced as 'editor's pick' in the Blue Team News and in Ollie Whitehouse's security news

I was also grateful that this article gained traction on Twitter [1, 2, 3]

​

HiveNightmare

Honestly the infosec community and their names. I wrote about the permissions error in critical Windows files that would allow an adversary to escalate privileges and steal credentials

  • Created a script and GitHub repo that simplified the confusion of which machines were vulnerable and how. You can read more here


Our method was referenced in one or two articles also. 

There were great responses from Twitter on this one [12 ,3]​

​

PrintNightmare

I wrote two things about the PrintNightmare Windows exploit.

This received some awesome Twitter interaction [1, 2, 3]

​​

Active Directory Certificate Services

SpectreOps wrote a brutal offensive security research piece all about exploiting Microsoft's implementation of Public Key Infrastructure in their Active Directory, called Certificate Services. I extrapolated the defensive guidance in their report, expanded on it, and found alternative hardening techniques.​

There was great Twitter interaction for this defensive guidance [1​]

​

Microsoft Exchange 'ProxyLogon' Zero-Day

I was the incident responder for Exchange in idents during this time.  I also identified a number of mistakes some sysadmins had made when patching their Exchange servers.

  • I collected the mistakes and their fixes together and bundled it into a  quick guidance piece we released to the public.

    ​​​

The Blue Team Notes

I open sourced the Blue Team Notes, dedicated to digital forensics, incident response, threat hunting, malware analysis, and more!​

2020

Police Digital Security Centre

In conjunction with the PDSC, I released a small series of cyber security guidance. It was written for non-technical small businesses.

​

Masscan to Nmap

I duck-taped together two network scanners with Python. This was to leverage the advantages of both as simply as possible

​

Hack the Box Writeups

I began to publish walkthroughs of lab machines from Hack the Box!

2019

Psychology and Cyber security

Short article on the benefits of interdisciplinary insight from psychology in cyber security. Published in the The British Psychological Society's PsychTalk

​

Cyber War, Supply Chains, and Realism in Lithuania

A NATO-supported trip to Lithuania resulted in a short blog post all about the cyber security threats and proactive defences that the Lithuanian state takes

You can find a scary video of me, talking in Lithuania about cyber security, military practice, and international cooperation.

​

Cyber Security for Small Businesses: A Review Of the Advice

SME's employ half the UK's working adults. Yet security advice and products strangely ignore them. For an NCSC event, I wrote up why this is the case and what good advice exists anyway.

​

Cyber Espionage Conference & Report

A collaborative event between Oxford and Royal Holloway. I co-edited the report, as well as spoke at the event on the philosophies and doctrines fuelling Russian cyber antagonism 

​

The English Language in Computer Programming

I gave a short talk in Washington, DC, about the politics of the English language in many computer programming languages

©2021 by Dray Agha. Proudly created with Wix.com

bottom of page