<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>DFIR on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/dfir/</link><description>Recent content in DFIR on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Wed, 15 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/dfir/index.xml" rel="self" type="application/rss+xml"/><item><title>Splunk-AWSRaid</title><link>https://hexpysya.github.io/blue_team/splunk-awsraid/</link><pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/splunk-awsraid/</guid><description>An attacker conducted a brute-force attack to compromise the helpdesk.luke account, performed reconnaissance from various VPN IPs, exfiltrated sensitive data including customer backups and secrets, modified bucket permissions, and established persistence by creating an admin backdoor account.</description></item><item><title>Splunk-ShadowRoast</title><link>https://hexpysya.github.io/blue_team/splunk-shadowroast/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/splunk-shadowroast/</guid><description>A masqueraded AdobeUpdater.exe binary established persistence via a registry Run key, injected into cmd.exe, performed AS-REP Roasting with Rubeus against four AD accounts, laterally moved to FileServer using cracked tcooper credentials, enabled RDP, and staged share data for exfiltration.</description></item><item><title>HTB-Liberty</title><link>https://hexpysya.github.io/investigations/htb-liberty/</link><pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-liberty/</guid><description>Password spraying led to domain account compromise, followed by NetNTLM hash theft via a malicious .url file, RDP access, data exfiltration to a C2 server, and PSWA backdoor installation for persistence.</description></item><item><title>THM-Phishing Unfolding</title><link>https://hexpysya.github.io/blue_team/thm-phishing-unfolding/</link><pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/thm-phishing-unfolding/</guid><description/></item><item><title>HTB-WorkFromHome</title><link>https://hexpysya.github.io/investigations/htb-workfromhome/</link><pubDate>Mon, 16 Feb 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-workfromhome/</guid><description>A victim clicked a phishing link impersonating a corporate login page, leading to credential theft. The attacker used stolen credentials to gain RDP access, then escalated privileges via SeManageVolumeExploit, deployed malicious DLLs using certutil, and established persistence through a hidden VBS script in the Startup folder.</description></item><item><title>HTB-EasyMoney</title><link>https://hexpysya.github.io/investigations/htb-easymoney/</link><pubDate>Thu, 05 Feb 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-easymoney/</guid><description>Administrator executed a malicious shortcut that triggered a hidden PowerShell command, downloading and executing payload and gaining a shell access. The attacker enumerated installed software, identified a vulnerable Yandex Browser (CVE-2024-6473), and exploited DLL hijacking by planting a malicious library that acts as a dropper. This dropper deployed a Sliver C2 implant establishing persistence via a scheduled task and maintaining communication</description></item><item><title>HTB-LuckyShot</title><link>https://hexpysya.github.io/investigations/htb-luckyshot/</link><pubDate>Mon, 02 Feb 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-luckyshot/</guid><description/></item><item><title>HTB-MangoBleed</title><link>https://hexpysya.github.io/investigations/htb-mongobleed/</link><pubDate>Fri, 30 Jan 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-mongobleed/</guid><description/></item></channel></rss>