Info
Hello there. I'm your go-to…
Activiteit
-
Good news: native sysmon coming to win11/winsrv2025! 🎉 https://lnkd.in/eYVtieeC
Good news: native sysmon coming to win11/winsrv2025! 🎉 https://lnkd.in/eYVtieeC
Gedeeld door Ivo Pooters
-
A threat actor built an agentic system based on Claude LLM to conduct their intrusions. Maybe we can reinvent the 🍯, include some indirect prompt…
A threat actor built an agentic system based on Claude LLM to conduct their intrusions. Maybe we can reinvent the 🍯, include some indirect prompt…
Gedeeld door Ivo Pooters
Ervaring en opleidingen
Licenties en certificaten
-
-
Neural Networks and Deep Learning
DeepLearning.AI
-
-
AlienVault Certified Security Engineer
AlienVault
Toegekend:Certificatienummer: 2821196 -
Certified Information System Security Professional
ISC2 Chapter Netherlands
Toegekend: -
-
Publicaties
-
Extracting SQLite records
Digital Forensic Research Workshop Challenge 2011
Publicatie weergevenWinning submission for the challenge. An innovative method was developed for carving SQLite records from any type of file system. It was specifically applied to a flash memory image from an Android smart phone.
-
Full user data acquisition from Symbian smart phones
Digital Investigation
Publicatie weergevenCurrently there is a lack of non-intrusive methods to create linear bitwise copies of the internal flash memory of Symbian smart phones. Furthermore, little is known about the locations and the format in which Symbian OS stores data. The goal of this research is to create a software tool that can be executed on the Symbian OS and creates linear bitwise copies of the internal flash memory. The result is the Symbian Memory Imaging Tool (SMIT) which can image the volumes of the internal flash…
Currently there is a lack of non-intrusive methods to create linear bitwise copies of the internal flash memory of Symbian smart phones. Furthermore, little is known about the locations and the format in which Symbian OS stores data. The goal of this research is to create a software tool that can be executed on the Symbian OS and creates linear bitwise copies of the internal flash memory. The result is the Symbian Memory Imaging Tool (SMIT) which can image the volumes of the internal flash memory and copies the images to a removable memory device. The SMIT opens the way to retrieve deleted data in a non-intrusive manner. Additionally, a preliminary exploration of the Symbian user volume was performed to determine the locations of forensically important (deleted) data.
Cursussen
-
Advanced Digital Forensics and Incident Response
SANS FOR508
-
Botnet Takeover attacks for reverse engineers
RECON2014
-
Coursera - 100 days of Python bootcamp 2022
-
-
Coursera Linear algebra for machine learning
6FH9XGWA4SLW
-
IDA Pro
-
Talen
-
English
-
-
Croatian
Basisvaardigheid
-
Dutch
Moedertaal of tweetalig
Meer activiteiten van Ivo
-
Major upgrade to the ATT&CK framework. Most notably a shift on the defensive side to providing more behavior-focused guidance.…
Major upgrade to the ATT&CK framework. Most notably a shift on the defensive side to providing more behavior-focused guidance.…
Gedeeld door Ivo Pooters
-
𝗗𝗼𝗼𝗿𝘃𝗲𝗿𝘄𝗶𝗷𝘀𝗯𝗼𝗼𝗺 𝗖𝗯𝘄-𝗼𝗿𝗴𝗮𝗻𝗶𝘀𝗮𝘁𝗶𝗲𝘀 Organisaties die onder de aankomende Cyberbeveiligingswet (Cbw) komen te vallen…
𝗗𝗼𝗼𝗿𝘃𝗲𝗿𝘄𝗶𝗷𝘀𝗯𝗼𝗼𝗺 𝗖𝗯𝘄-𝗼𝗿𝗴𝗮𝗻𝗶𝘀𝗮𝘁𝗶𝗲𝘀 Organisaties die onder de aankomende Cyberbeveiligingswet (Cbw) komen te vallen…
Gemarkeerd als interessant door Ivo Pooters
-
🚨 BREKEND: "Overstap kantoorautomatisering Belastingdienst naar M365 op Amerikaanse servers" https://lnkd.in/egX8MB6c
🚨 BREKEND: "Overstap kantoorautomatisering Belastingdienst naar M365 op Amerikaanse servers" https://lnkd.in/egX8MB6c
Gemarkeerd als interessant door Ivo Pooters
-
Poisoning Large Language Models (LLMs) by injecting malicious data into the training dataset is not a new concept. However, recent research by…
Poisoning Large Language Models (LLMs) by injecting malicious data into the training dataset is not a new concept. However, recent research by…
Gedeeld door Ivo Pooters
-
🔙 We’re back with a new blog, this time diving into a recent incident response case study. If you’re looking to understand Business Email…
🔙 We’re back with a new blog, this time diving into a recent incident response case study. If you’re looking to understand Business Email…
Gemarkeerd als interessant door Ivo Pooters
-
After almost 9 years, the time has come for me to leave Fox-IT and see what the rest of the world has to offer. I’m excited to share that I have…
After almost 9 years, the time has come for me to leave Fox-IT and see what the rest of the world has to offer. I’m excited to share that I have…
Gemarkeerd als interessant door Ivo Pooters
-
What if ... you have a script running with root privileges, executing local web binaries to determine the installed versions. Could you turn this…
What if ... you have a script running with root privileges, executing local web binaries to determine the installed versions. Could you turn this…
Gemarkeerd als interessant door Ivo Pooters
-
Na meer dan een jaar hard werken met liefde en toewijding aan Groente-Traiteur Fenkel komt er toch een einde aan dit avontuur. We hebben vorige week…
Na meer dan een jaar hard werken met liefde en toewijding aan Groente-Traiteur Fenkel komt er toch een einde aan dit avontuur. We hebben vorige week…
Gemarkeerd als interessant door Ivo Pooters
-
Great report by Mandiant: 393 days of persistence 😬 This is why you should consider extending your log retention period beyond regulatory…
Great report by Mandiant: 393 days of persistence 😬 This is why you should consider extending your log retention period beyond regulatory…
Geplaatst door Ivo Pooters
-
Interesting research on using LLMs to write working exploit code: https://lnkd.in/ek5zdnJm This project is limited to CVEs in open-source software…
Interesting research on using LLMs to write working exploit code: https://lnkd.in/ek5zdnJm This project is limited to CVEs in open-source software…
Gedeeld door Ivo Pooters
-
Yikes, this npm supply chain attack is actually a credential harvesting worm. The number of infected packages is growing.. https://lnkd.in/ebswadvp
Yikes, this npm supply chain attack is actually a credential harvesting worm. The number of infected packages is growing.. https://lnkd.in/ebswadvp
Gedeeld door Ivo Pooters