Offensive Cyber Operations
White Knight Labs has successfully completed a number of sophisticated engagements, resolving or preventing cybersecurity challenges.
We can't write about our engagements, but we can provide an reasonable explanation of the technologies, risks and challenges of our work.
Unleashing the Unseen: Harnessing the Power of Cobalt Strike Profiles for EDR Evasion
In this blog post, we will go through the importance of each profile’s option, and explore the differences between default and customized Malleable C2 profiles...
Read More“Can’t Stop the Phish” – Tips for Warming Up Your Email Domain Right
Introduction Phishing continues to be a lucrative vector for adversaries year after year. In 2022, for intrusions observed by Mandiant, phishing was the second most...
Read MoreMasking the Implant with Stack Encryption
This article is a demonstration of memory-based detection and evasion techniques. Whenever you build a Command & Control or you perform threat hunting, there will...
Read MoreUnveiling OSINT Techniques: Exploring LinkedIn, Illicit Services, and Dehashed for Information Gathering
Introduction Open Source Intelligence (OSINT) is becoming increasingly popular due to its effectiveness in gathering information. The purpose of this blog is to explore the...
Read MoreClutch Highlights White Knight Labs as A Top B2B Company in Pennsylvania
Our team began almost five years ago to give companies the best possible digital experience. After all this time, we’re happy to report that not...
Read MoreBypassing ETW For Fun and Profit
EDR products have the option of using multiple sources to collect information on a Widows operating system. One of these log sources is ETW (Event...
Read MoreNeutering the EDR
EDR (Endpoint Detection and Response) products attempt to detect misbehavior that slightly deviates from the baseline, by continuously analyzing the memory for inter-process interactions. While...
Read More