<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>amalbyte</title><link>https://amalbyte.github.io/blog/</link><description>Recent content on amalbyte</description><generator>Hugo</generator><language>en</language><copyright>&lt;a href="https://creativecommons.org/licenses/by-nc/4.0/" target="_blank" rel="noopener">CC BY-NC 4.0&lt;/a></copyright><lastBuildDate>Sun, 01 Feb 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://amalbyte.github.io/blog/index.xml" rel="self" type="application/rss+xml"/><item><title>Mimikatz &amp; the Art of Exploitation</title><link>https://amalbyte.github.io/blog/posts/fourth/</link><pubDate>Sun, 01 Feb 2026 00:00:00 +0000</pubDate><guid>https://amalbyte.github.io/blog/posts/fourth/</guid><description>Mimikatz is a post-exploitation credential dumping tool that is used to extract credentials from the Windows Operating System. The tool was originally created to experiment with the security of authentication protocols and has since been used by security professionals and threat actors to bypass security controls.
Credential dumping LSASS
To perform credential dumping mimikatz leverages the Local Security Authority Subsystem Service (LSASS) which is responsible for the authentication of users and security policies.</description></item><item><title>ClickFlix to CrashFlix</title><link>https://amalbyte.github.io/blog/posts/fifth/</link><pubDate>Tue, 20 Jan 2026 00:00:00 +0000</pubDate><guid>https://amalbyte.github.io/blog/posts/fifth/</guid><description>The ever changing landscape of cyber security has shown us a change in tactics and techniques when it comes to social engineering. In early 2025, security researchers observed a rise in Clickflix campaigns - a technique that leverages the use of fake verification prompts and error messages to trick users into executing commands.
Implementation: User redirected to malicious website -&amp;gt; Fake CAPTCHA pop-up that asks users to follow the instructions to verify themselves -&amp;gt; Malicious command is pasted by user into the Windows Run Dialog box -&amp;gt; Code is executed</description></item><item><title>Abusing the ELF Format</title><link>https://amalbyte.github.io/blog/posts/third/</link><pubDate>Mon, 05 Jan 2026 00:00:00 +0000</pubDate><guid>https://amalbyte.github.io/blog/posts/third/</guid><description>ELF (Executable and Linkable Format): The ELF format defines the structure for executables, shared libraries and core dumps in Unix-like systems. From a detection-engineering perspective, it&amp;rsquo;s important to understand not just how ELF files are supposed to look, but also how malware authors commonly manipulate them to evade static analysis.
ELF files consist of:
ELF Header Program Header Table (segments) Section Header Table (sections) Data ELF file headers contain information about the file like the location of the program, type, entry point address etc.</description></item><item><title>Windows Forensics: Hidden Execution</title><link>https://amalbyte.github.io/blog/posts/second/</link><pubDate>Sun, 21 Dec 2025 00:00:00 +0000</pubDate><guid>https://amalbyte.github.io/blog/posts/second/</guid><description>There are various methods one could employ to hide the execution of commands, whether it be via process injection or simply hiding the console window. Luckily for us, there are also many artifacts we could utilize to put the pieces together. To start things off it would be good to look into application shimming.
Application Shimming (T1546.011) Application shimming is a Windows feature designed to maintain compatibility for older software.</description></item><item><title>Everything WMI</title><link>https://amalbyte.github.io/blog/posts/first/</link><pubDate>Mon, 08 Dec 2025 00:00:00 +0000</pubDate><guid>https://amalbyte.github.io/blog/posts/first/</guid><description>Let&amp;rsquo;s get into the goldmine that is WMI&amp;hellip;
Windows Management Instrumentation (WMI) is the infrastructure for management data and operations on Windows-based operating systems. It is used by developers and system administrators to manage and interact with system internals. This also means that it&amp;rsquo;s abused by attackers in order to move laterally throughout a system, establish fileless persistence and store payloads in memory.
Communication Traditionally, WMI queries used DCOM via RPC (Remote Procedure Call) which utilized random high ports (Make yourself at home!</description></item><item><title>TTPs</title><link>https://amalbyte.github.io/blog/ttps/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://amalbyte.github.io/blog/ttps/</guid><description>Thoughts, tools and POC&amp;rsquo;s?</description></item></channel></rss>