John Hammond
Blogs, Articles, and Posts
From PowerShell to Payload: An Analysis of Weaponized Malware
(huntress.com)
Click, boom, and your network is compromised. All a hacker needs is one successful exploit and you
By: John Hammond submitted:Jun 16 2022
Click, boom, and your network is compromised. All a hacker needs is one successful exploit and you
could have a very bad day. Recently, we uncovered one artifact that we would like to break down and showcase. We will get "into the wee ds" here and really deep-dive on the technical details, so put on your ear protection and let's walk down range...
By: John Hammond submitted:Jun 16 2022
From PowerShell to Payload: An Analysis of Weaponized Malware | Threatpost
(threatpost.com)
John Hammond, security researcher with Huntress, takes a deep-dive into a stager's technical and
By: John Hammond submitted:Jun 16 2022
John Hammond, security researcher with Huntress, takes a deep-dive into a stager's technical and
coding aspects.
By: John Hammond submitted:Jun 16 2022
Books, Media, and Learning Resources
How Hackers Can Hide PowerShell in Environment Variables
(youtube.com)
A pretty good refresher on something to look out for.
By: John Hammond submitted:Apr 5 2024
A pretty good refresher on something to look out for.
By: John Hammond submitted:Apr 5 2024