Cheap Malware Calls for Cheap Defense: Shellcode and Defense Tools on an SMB Security Budget
This research will examine the varieties of free and open-source tooling available for shellcode-based attacks and defense against them. This research will answer, by practical experimentation, the question of how these tools work and which are effective in multiple contexts.
SANS_Cheap_Malware_Calls_for_Cheap_Defense_Shellcode_and_Defense_Tools_on_an_SMB_Security_Budget (PDF, 0.69MB)
16 Aug 2024Related Content
Implementing Micro-Segmentation in a Legacy Enterprise Lab Network: A Zero Trust Approach to Reducing Lateral Movement, Improving Containment, and Controlling Operational Overhead
Research PaperThis study evaluates micro-segmentation as a practical Zero Trust control in a Windows Active Directory lab that models common legacy dependencies (directory services, file services, a web tier, and a database tier).
- 24 Mar 2026
Assessing the Impact of Memory Acquisition on Key Windows Artifacts
Research PaperThis research evaluates the impact of memory capture tools on data at rest, aiming to understand the degree of change that occurs to artifacts, measure differences based on tool selection, and inform best practices for live responders.
- 20 Mar 2026
From Ambiguity to Action: A Forensic Framework for Differentiating ClickFix Payloads
Research PaperThe "ClickFix" social engineering technique, which leverages fake CAPTCHA or browser update lures to trick users into executing a malicious PowerShell script, presents a critical challenge for incident responders.
- 24 Feb 2026
Digital Forensics and Incident Response in the Cloud: Addressing GCP Challenges
Research PaperMany digital forensics and incident response (DFIR) practitioners, as well as aspiring cybersecurity analysts, often gravitate towards AWS and Azure as their first forays into cloud security.
- 16 Jan 2026
Inside the Five Most Dangerous New Attack Techniques
Research PaperThis e-book represents the next evolution of that effort. Here, we take the five key topics presented from the keynote stage and expand them into four full-length chapters.
- 8 Dec 2025
- Heather Barnhart, Rob T. Lee, Joshua Wright, Tim Conway
Measuring Malware Obfuscation: Evaluating CNN- Based Detection for Real-World Resilience
Research PaperThis study examined how layered obfuscation affects image-based convolutional neural network (CNN) detectors and introduces a novel, reproducible framework for measuring obfuscation itself.
- 19 Nov 2025
Scrutinizing A Web-Based LLM in Private Browsing Mode: An Analysis of Memory Artifacts and Privacy Implications
Research PaperUsing web-based LLMs such as ChatGPT has changed the web browsing landscape to become part of the typical everyday experience.
- 7 Nov 2025
Adversary-Aware IOC Retention: Analyzing Time-to-Live Patterns by Threat Actor Attribution
Research PaperAfter analyzing hundreds of IOCs across three unique Advanced Persistent Threats (APTs) from disparate regions, it can be confirmed that not only do threat actors cycle their IOCs at different rates, but those rates can be tracked. This paper introduces an enhanced decay model incorporating a threat actor variable that accounts for these differences in sophistication and hygiene.
- 23 Oct 2025
Breaking Time: Methods, Artifacts, and Forensic Detection of Timestomping on FAT32, Ext3, and Ext4 File Systems
Research PaperThis paper explores the diverse methods used to timestomp files on FAT, Ext3, and Ext4 file systems, focusing on how adversaries adapt their approaches based on available system access and permissions.
- 23 Oct 2025
Breaking Through Deception: Addressing Barriers in the Adoption of Cyber Deception Technologies
Research PaperDespite the increasing sophistication of cyber threats and the need for organizations to employ innovative defense strategies, cyber deception technologies, tools designed to mislead attackers and gain a defensive advantage, remain significantly underutilized across organizational cybersecurity programs.
- 23 Oct 2025
Forensic Investigation of Bluetooth-Based Credit Card Skimmers
Research PaperHidden Bluetooth Low Energy (BLE) credit skimmers are a growing threat to credit card fraud. Criminals can set up practical and inexpensive systems built on top of modules, such as the HM-19, to collect and transmit stolen data covertly across wireless channels.
- 3 Sep 2025
Catching the Hand in the Cookie Jar: Canary Session Cookies
Research PaperThis project demonstrates how even applications secured with MFA are still vulnerable to hijacked session cookies. Given the persistent threats posed to organizations by stolen authentication cookies, this research proposes implementing Canary session cookies to detect the theft and malicious use of credentials.
- 17 Apr 2025
A Pebble In the Ocean: Maximizing Log Fidelity In Container Environments
Research PaperLog fidelity is crucial for Incident Response Teams to investigate and contain cyber incidents but...
- 17 Apr 2025
Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success
Research PaperIdentification of phishing emails can be cumbersome, accomplished by rule-based filters, machine...
- 7 Jan 2025
Hunting the Hound of Hades: Kerberos Delegation Attacks, Detections and Defenses
Research PaperWhen misconfigured, Kerberos delegation in an Active Directory environment can lead to complete...
- 23 Dec 2024
Rapid Incident Response on macOS: Actionable Insights in Under an Hour
Research PaperThe increasing use of macOS in enterprises requires fast, effective incident response (IR)...
- 5 Dec 2024
Finding Lateral Movement of Adversaries Through the Noise of Systems Administration
Research PaperThis paper aims to delve into the intricacies of distinguishing between routine administrative...
- 14 Aug 2024
- Brian Almond
You Can Run but You Cannot Hide (In Process Memory): Observing Process Injection with eBPF in Linux
Research PaperUse of built-in capabilities for injecting malicious code as a persistence technique is used by...
- 3 May 2024
Accelerating Incident Response: Applying Confidence Aggregation to Defensive Artifacts
Research PaperIncident response plays an integral role in cybersecurity today. Despite the successes of the...
- 19 Mar 2024
The Art of Network File Sharing Forensics and Data Recovery
Research PaperNetwork file-sharing forensics is one of the challenging topics in Windows forensics as the user...
- 12 Mar 2024
