Pen & Keyboard: The CTI's Handbook
  • ~# welcome !
  • CTI | Cyber Threat Intellignce
    • Introduction to CTI
    • CTI Fundamentals
      • Pyramid Of Pain
    • Data Collection and Sources
      • HUMINT
      • OSINT
        • Image Analyzer Transforms for Maltego
        • Carrot2
    • Threat Actors and Profiles
      • The Heist: Unmasking the Qakbot Banking Trojan
        • Exploring Qakbot #01: An In-Depth OneNote Analysis
        • Exploring Qakbot #02: Decoding Qakbot DLL Stager: A Reverse Engineering Analysis
    • Indicators of Compromise (IOCs)
    • Threat Intelligence Platforms (TIPs)
    • Analysis and Threat Assessment
    • Incident Response and Mitigation
    • Case Studies
      • Case #01 - Water Dybbuk Group
      • Case #02 - Indian Spammers Exploit Thousands with Fake Norton Antivirus Refund Scam via Google Forms
    • CTI Sharing and Collaboration
    • Tools and Resources
    • Emerging Threats
    • Best Practices and Tips
    • Challenges and Ethical Considerations
    • Projects
      • IOCs Finder: Your Cyber Threat Intelligence Hub
    • Resources
  • Cyber Warfare
    • Edward Snowden: Spies and the Law - BBC Documentary 2015
  • Learning-Assembly
    • Assembly + C - Part # 1
    • Assemby + C - Part # 2
    • Assemby + C - Part # 3+4
    • Assembly + C - Part #5
Powered by GitBook
On this page
  1. CTI | Cyber Threat Intellignce

Indicators of Compromise (IOCs)

PreviousExploring Qakbot #02: Decoding Qakbot DLL Stager: A Reverse Engineering AnalysisNextThreat Intelligence Platforms (TIPs)