netresec Profile Banner
π™½π™΄πšƒπšπ™΄πš‚π™΄π™² Profile
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²

@netresec

Followers
9K
Following
6K
Media
530
Statuses
4K

Experts in Network Forensics and Network Security Monitoring. Creators of #NetworkMiner, #CapLoader, #PacketCache, #PolarProxy and #RawCap.

Joined November 2011
Don't wanna be here? Send us removal request.
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
2 months
New network forensics training scheduled! πŸ“… February 23-26, 2026 ⏲️ 13:00 to 17:00 CET (7am to 11am EDT) 🌍 Live online https://t.co/TkPpSvcLej
Tweet card summary image
netresec.com
I will teach a live online network forensics training on February 23-26. The full title of the class is Network Forensics for Incident Response, where we will analyze PCAP files containing network...
0
4
12
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
2 days
Thank you @TheDFIRReport for capturing this intrusion traffic! πŸŽ‰
0
0
1
@weare_unplugged
Unplugged
6 days
Why are Big Tech companies are funding the radical overhaul of the U.S. justice system? They are giving money to organizations with goals to decarcerate repeat offenders and to eliminate cash bail. Choose Unplugged - a company that believes in a strong, thriving America.
0
10
40
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
2 days
Keylog of attacker's hands-on keyboard actions from BackConnect VNC session
1
0
3
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
2 days
Here's one of the screenshots from the BackConnect VNC sessions in the blog post
1
0
1
@arkanalabs
Arkana Laboratories
5 months
Have you integrated APOL1 genetic testing into your practice? Discover the No-Cost APOL1 Genotyping Program for eligible patients sponsored by Vertex Pharmaceuticalsβ€”helping you deliver precision care without added cost. Learn more today!
21
24
230
@skocherhan
ά›ά”ά”ά”ά›ά”ά›ά”ά›
10 days
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
10 days
@skocherhan Sound advice on ThreatFox's ASN report for AS215826 https://t.co/ieuywxlxQk
1
3
10
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
11 days
NetworkMiner 3.1 Released! πŸ”‘ More usernames, passwords and hostnames πŸ’» Improved user interface πŸ‘Ύ Better details from malware C2 traffic https://t.co/aiCVVTw6Uu
Tweet card summary image
netresec.com
This NetworkMiner release brings improved extraction of artifacts like usernames, passwords and hostnames from network traffic. We have also made some updates to the user interface and continued our...
1
28
88
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
15 days
We've now updated our PCAP-over-IP blog post to include information about pcap-broker and an example on how to run it in a docker container. https://t.co/JJsz6iDS1B
Tweet card summary image
netresec.com
PCAP-over-IP is a method for reading a PCAP stream, which contains captured network traffic, through a TCP socket instead of reading the packets from a PCAP file. A simple way to create a PCAP-over...
0
0
2
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
15 days
pcap-broker lets you distribute real-time PCAP-over-IP streams with sniffed traffic to multiple clients. Thanks to @YunZhengHu for releasing it! https://t.co/PFfIlWhQ7N
Tweet card summary image
github.com
PCAP-over-IP server written in Golang. Contribute to fox-it/pcap-broker development by creating an account on GitHub.
2
5
27
@ufc
UFC
8 days
This January
5
10
196
@abuse_ch
abuse.ch
29 days
We are excited that we were once again part in the coordinated international operation #OpEndgame πŸ“£, taking action against the notorious information and credential stealer #Rhadamanthys πŸ•΅οΈ We assisted in the takedown of threat actor infrastructure and share a full list of
7
32
120
@Europol
Europol
29 days
Operation Endgame’s latest phase targeted the infostealer Rhadamanthys, Remote Access Trojan VenomRAT, and the botnet Elysium. Read more in our press release: https://t.co/IHnIahrWo0
5
70
148
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
1 month
Monitoring for too many old indicators not only costs money, it can even inhibit detection of real intrusions. πŸ“† Include "last seen" when publishing IOCs ❌ Prune old IOCs πŸ“œ Prioritize long lived IOCs over short lived ones https://t.co/7PvNbgsbRX
Tweet card summary image
netresec.com
Are you importing indicators of compromise (IOC) in the form of domain names and IP addresses into your SIEM, NDR or IDS? If so, have you considered for how long you should keep looking for those...
1
3
9
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
2 months
The analyzed #PureRAT sample looks very similar to the one @darkrym11 recently blogged about. It even uses the same C2 157.66.26.209:56001. https://t.co/xMUcKNX51J
1
0
0
@davidcasem
David Casem
9 days
The coming years will split companies into two groups: those that become AI-native and those left catching up. The innovators who harness AI now will define the winners of tomorrow. Follow me for strategic insights on leading through the AI revolution.
6
13
113
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
2 months
The technical detail in this #PureRAT analysis by Heejae Hwang (ν™©ν¬μž¬) is fantastic! https://t.co/2ULvBtADK5
1
21
100
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
2 months
Here are the decoded/decompressed HTTP/2 headers from Nezha. It's using #gRPC, or more specifically the grpc-go library.
1
3
7
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
2 months
The use of TLS is pretty much mandatory for HTTP/2, yet this #Nezha backoor POSTS HTTP/2 data over TCP port 80 without encryption! πŸ”₯ 172.245.52[.]169:80 πŸ”₯ c.mid[.]al:80 https://t.co/KAbizTOq24 https://t.co/ymXjczpsUm
@CyberRaiju
Jai Minton
2 months
This was used to install Nezha agent, and Nezha was used to deploy Ghost RAT on the endpoint. This was only the beginning though, full details including research into potential victim locations with this malicious Nezha Agent can be found below πŸ‘‡ https://t.co/A17y5FPmo0
2
9
58
@netresec
π™½π™΄πšƒπšπ™΄πš‚π™΄π™²
2 months
@Cloudflare You are still serving the malicious EXE+YAML combo mentioned in @Huntress blog via rism.​pages.​dev. Please kill this domain πŸ™ πŸ”₯ rism[.]pages[.]dev/config.yml πŸ”₯rism[.]pages[.]dev/microsoft.exe
@MaxRogers5
Max Rogers
2 months
1⃣ The @Huntress team uncovered a campaign by a likely China-nexus threat actor. The most novel finding is use of a publicly available tool called Nezha as a post-exploitation C2 agent. This is the first public reporting of the tool I've seen.
1
3
7