📘
DFIR
search
Ctrlk
  • Networking
    • Networkingchevron-right
  • Windows
    • Administrationchevron-right
    • Forensicschevron-right
      • System Info
      • Memorychevron-right
      • Network Logschevron-right
      • File Systemchevron-right
      • Registrychevron-right
      • Network Share
      • Exfiltrationchevron-right
      • Evidence of Executionchevron-right
      • Hacktool Artifactschevron-right
      • Event Logschevron-right
      • 3rd Party Appschevron-right
        • IIS
        • Kubernetes
        • GitHub
        • Jenkins
        • Snowflake
        • Miscchevron-right
        • "TA Tools"chevron-right
          • Ngrok
          • 7-Zip
          • PDQ Deploy
          • TotalCMD
          • WinSCP
        • Identity Appschevron-right
        • Microsoftchevron-right
        • SysInternalschevron-right
        • RMMchevron-right
        • Zoom
        • Browser Forensicschevron-right
      • Example Page
    • Cheat Sheetchevron-right
    • Investigationchevron-right
    • Internalschevron-right
    • Active Directorychevron-right
    • MISCchevron-right
  • Linux
    • Forensicschevron-right
    • SSH
    • Linux WebShells
    • Directories of Interest
    • Internalschevron-right
  • Enterprise Architecture
    • CI/CD Piplinechevron-right
    • Citrixchevron-right
    • Web Applicationschevron-right
    • The Cloudchevron-right
    • vSpherechevron-right
    • Containerschevron-right
    • Troubleshootingchevron-right
  • Mac
    • Forensicschevron-right
  • Attacker Information
    • Adversary Operationschevron-right
    • Actor Playbookschevron-right
    • Abused Domains
  • IR Playbook
    • Activity from Unmanaged Host
    • Recommendations
  • Reverse Engineering
    • Python - Pyinstaller
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Windowschevron-right
  2. Forensicschevron-right
  3. 3rd Party Appschevron-right
  4. "TA Tools"

Ngrok

LogoHunting and remediating ngrok tunnels using LogpointLogpointchevron-right
LogoAbusing Ngrok: Hackers at the End of the Tunnel | HuntressHuntresschevron-right
https://c99.sh/hunting-ngrok-activity/c99.shchevron-right

hashtag
What Is?

hashtag
Attack:

hashtag
Detect:

hashtag
Mitigate:

Previous"TA Tools"chevron-leftNext7-Zipchevron-right

Last updated 1 year ago

  • What Is?
  • Attack:
  • Detect:
  • Mitigate: