WMImplant leverages WMI for the command and control channel, the means for executing actions (gathering data, issuing commands, etc.) on the targeted system, and data storage.Read more...
Entries filed under 'Christopher Truncer'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
March 3, 2017 8:00 AM By Christopher Truncer | Advanced Malware, Threat Research
Everything you need to know about Veil 3.0, the latest update on tools designed for use during offensive security training.Read more...
July 27, 2016 10:00 AM By Evan Pena, Chris King, Christopher Truncer | Vulnerabilities, Threat Research
The FireEye Red Team creates and modifies tools as a need is identified. Some tools introduce new techniques to accomplish a goal, while others simply automate existing tools and techniques to scale better. This blog discusses some new tools we've developed or significantly contributed to that make our lives easier, and offers some case studies to demonstrate them.