<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://countuponsecurity.com/2021/05/17/fireeye-endpoint-security-hx-supplementary-tools/</loc><lastmod>2021-05-17T12:05:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2019/10/14/notes-on-linux-memory-analysis-lime-volatility-and-lkms/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2019/10/reptilehooking-tcp.jpg</image:loc><image:title>reptilehooking-tcp</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2019/10/reptilehooking-1.jpg</image:loc><image:title>reptilehooking</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2019/10/reptilekernelinline.jpg</image:loc><image:title>reptilekernelinline</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2019/10/reptilehiddenmodules.jpg</image:loc><image:title>reptilehiddenmodules</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2019/10/reptilehooking.jpg</image:loc><image:title>reptilehooking</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2019/10/reptileinstall.jpg</image:loc><image:title>reptileinstall</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2019/10/diaphorminesyscall.jpg</image:loc><image:title>diaphorminesyscall</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2019/10/diaphorminemodule.jpg</image:loc><image:title>diaphorminemodule</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2019/10/diaphormineinstall.jpg</image:loc><image:title>diaphormineinstall</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2019/09/volatilityprofile.jpg</image:loc><image:title>volatilityprofile</image:title></image:image><lastmod>2019-10-14T13:05:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/09/22/malicious-documents-pdf-analysis-in-5-steps/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/09/mal-pdf-step1-img21.png</image:loc><image:title>mal-pdf-step1-img2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/09/tojan-pdf1.png</image:loc><image:title>tojan-pdf</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/09/mal-pdf-step5-img1.png</image:loc><image:title>mal-pdf-step5-img1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/09/mal-pdf-step4-img1.png</image:loc><image:title>mal-pdf-step4-img1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/09/mal-pdf-step3-img2.png</image:loc><image:title>mal-pdf-step3-img2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/09/mal-pdf-step3-img1.png</image:loc><image:title>mal-pdf-step3-img1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/09/mal-pdf-step2-img1.png</image:loc><image:title>mal-pdf-step2-img1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/09/mal-pdf-step1-img4.png</image:loc><image:title>mal-pdf-step1-img4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/09/mal-pdf-step1-img3.png</image:loc><image:title>mal-pdf-step1-img3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/09/mal-pdf-step1-img2.png</image:loc><image:title>mal-pdf-step1-img2</image:title></image:image><lastmod>2019-06-04T08:13:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2018/11/05/six-years-ago/</loc><lastmod>2019-09-04T11:54:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2018/06/20/digital-forensics-plugx-and-artifacts-left-behind/</loc><lastmod>2018-06-20T21:07:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2018/05/09/malware-analysis-plugx-part-2/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/plugx-builder-20141.png</image:loc><image:title>plugx-builder-2014</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/plugx-buildoptions.png</image:loc><image:title>plugx-buildoptions</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/plugx-builderscreenrecord.png</image:loc><image:title>plugx-builderscreenrecord</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/plugx-deletefiles.png</image:loc><image:title>plugx-deletefiles</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/plugx-ad-download.png</image:loc><image:title>plugx-ad-download</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/plugx-ntdsutilexecution.png</image:loc><image:title>plugx-ntdsutilexecution</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/plugx-c2sessions.png</image:loc><image:title>plugx-C2sessions</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/plugx-commands.png</image:loc><image:title>plugx-commands</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/plugx-upload.png</image:loc><image:title>plugx-upload</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/plugx-unc-browsing.png</image:loc><image:title>plugx-unc-browsing</image:title></image:image><lastmod>2018-05-09T17:49:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2018/04/24/intro-to-american-fuzzy-lop-fuzzing-with-asan-and-beyond/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/afl-tcpdump-asan1.png</image:loc><image:title>afl-tcpdump-asan</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/afl-asan-crash-report.png</image:loc><image:title>afl-asan-crash-report</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/afl-msan.png</image:loc><image:title>afl-msan</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/afl-gdb-bufferoverread.png</image:loc><image:title>afl-gdb-bufferoverread</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/afl-hncp-analysis.png</image:loc><image:title>afl-hncp-analysis</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/afl-rabbit-crashes.png</image:loc><image:title>afl-rabbit-crashes</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/afl-peruvian.png</image:loc><image:title>afl-peruvian</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/afl-rabbit.png</image:loc><image:title>afl-rabbit</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/afl-asan-crashes-symbols.png</image:loc><image:title>afl-asan-crashes-symbols</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/04/afl-asan-crashes.png</image:loc><image:title>afl-asan-crashes</image:title></image:image><lastmod>2018-04-24T17:43:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2018/03/07/intro-to-american-fuzzy-lop-fuzzing-in-5-steps/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/03/cve-2017-13044.png</image:loc><image:title>cve-2017-13044</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/03/afl.png</image:loc><image:title>afl</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/03/afl-treestructure.png</image:loc><image:title>afl-treestructure</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/03/afl-whatsup.png</image:loc><image:title>afl-whatsup</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/03/afl-slavenodes.png</image:loc><image:title>afl-slavenodes</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/03/afl-masternode.png</image:loc><image:title>afl-masternode</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/03/afl-ramdisk.png</image:loc><image:title>afl-ramdisk</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/03/afl-cmin.png</image:loc><image:title>afl-cmin</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/03/afl-editcap.png</image:loc><image:title>afl-editcap</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/03/afl-tcpdump-install.png</image:loc><image:title>afl-tcpdump-install</image:title></image:image><lastmod>2018-03-10T12:02:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/12/evader/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/11/evader1.png</image:loc><image:title>Evader</image:title></image:image><lastmod>2018-02-10T11:14:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2018/02/04/malware-analysis-plugx/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/02/plugx-registry1.png</image:loc><image:title>plugx-registry</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/02/plugx-registry.png</image:loc><image:title>plugx-registry</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/02/plugx-decoder.png</image:loc><image:title>plugx-decoder</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/02/plugx-customencoding.png</image:loc><image:title>plugx-customencoding</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/02/plgux-operatorshell.png</image:loc><image:title>plgux-operatorshell</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/02/plugx-packet.png</image:loc><image:title>plugx-packet</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/02/plugx-c2wsasend.png</image:loc><image:title>plugx-C2wsasend</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/02/plugx-c2shelltraffic.png</image:loc><image:title>plugx-c2shelltraffic</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/02/plugx.png</image:loc><image:title>plugx</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2018/02/plugx-dumper.png</image:loc><image:title>plugx-dumper</image:title></image:image><lastmod>2018-02-06T17:54:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/19/countermeasures-against-botnets-legal-aspects/</loc><lastmod>2018-01-07T15:49:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2017/11/22/digital-forensics-artifacts-of-interactive-sessions/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/11/shimcachemem.png</image:loc><image:title>shimcachemem</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/11/wordwheelquery.png</image:loc><image:title>wordwheelquery</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/11/userassist.png</image:loc><image:title>userassist</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/11/lnkinfo.png</image:loc><image:title>lnkinfo</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/11/jumplists.png</image:loc><image:title>jumplists</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/11/shellbags.png</image:loc><image:title>shellbags</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/11/artifacts.png</image:loc><image:title>artifacts</image:title></image:image><lastmod>2018-03-07T13:39:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2017/04/12/intro-to-linux-forensics/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/04/dfir-linux111.png</image:loc><image:title>dfir-linux11</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/04/dfir-linux12.png</image:loc><image:title>dfir-linux12</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/04/dfir-linux10.png</image:loc><image:title>dfir-linux10</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/04/dfir-linux9.png</image:loc><image:title>dfir-linux9</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/04/dfir-linux7.png</image:loc><image:title>dfir-linux7</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/04/dfir-linux6.png</image:loc><image:title>dfir-linux6</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/04/dfir-linux8.png</image:loc><image:title>dfir-linux8</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/04/dfir-linux5.png</image:loc><image:title>dfir-linux5</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/04/dfir-linux4.png</image:loc><image:title>dfir-linux4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/04/dfir-linux3.png</image:loc><image:title>dfir-linux3</image:title></image:image><lastmod>2017-12-20T18:34:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2017/07/02/analysis-of-a-master-boot-record-eternalpetya/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/07/eternalpetya-bochsconfig.png</image:loc><image:title>eternalpetya-bochsconfig</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/07/eternalpetya-vmdk.png</image:loc><image:title>eternalpetya-vmdk</image:title></image:image><lastmod>2017-07-12T20:28:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2017/06/07/threat-hunting-in-the-enterprise-with-appcompatprocessor/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/06/acp-dump1.png</image:loc><image:title>acp-dump</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/06/acp-hits.png</image:loc><image:title>acp-hits</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/06/acp-search.png</image:loc><image:title>acp-search</image:title></image:image><lastmod>2017-08-13T11:36:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2017/05/25/digital-forensics-ntfs-change-journal/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/05/usnjrnl-timeline.png</image:loc><image:title>usnjrnl-timeline</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/05/usnjrnl2csv.png</image:loc><image:title>usnjrnl2csv</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/05/usnjrnl-istat.png</image:loc><image:title>usnjrnl-istat</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/05/usnjrnl-mmls.png</image:loc><image:title>usnjrnl-mmls</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/05/usnjrnl-fsutil1.png</image:loc><image:title>usnjrnl-fsutil</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/05/usnjrnl-fsutil.png</image:loc><image:title>usnjrnl-fsutil</image:title></image:image><lastmod>2017-05-25T14:27:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/05/30/digital-forensics-ntfs-indx-and-journaling/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/indxcrimescene.jpg</image:loc><image:title>indxcrimescene</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/ntfsindx-transactionlogs1.png</image:loc><image:title>ntfsindx-transactionlogs</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/ntfsindx-logfileparser.png</image:loc><image:title>ntfsindx-logfileparser</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/ntfsindx-parser.png</image:loc><image:title>ntfsindx-parser</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/ntfsindx-tsk.png</image:loc><image:title>ntfsindx-tsk</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/ntfsindx-fls.png</image:loc><image:title>ntfsindx-fls</image:title></image:image><lastmod>2017-05-24T09:04:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2017/02/26/offensive-tools-and-techniques/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/02/offensive-logo3.png</image:loc><image:title>offensive-logo</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/02/offensive-wmimove.png</image:loc><image:title>offensive-wmimove</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/02/offensive-kerberoast.png</image:loc><image:title>offensive-kerberoast</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/02/offensive-powerview.png</image:loc><image:title>offensive-powerview</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/02/offensive-wmicommands.png</image:loc><image:title>offensive-wmicommands</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/02/offensive-wmimof1.png</image:loc><image:title>offensive-wmimof</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/02/offensive-wmimof.png</image:loc><image:title>offensive-wmimof</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/02/offensive-pshcmd.png</image:loc><image:title>offensive-pshcmd</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/02/offensive-dllhijack.png</image:loc><image:title>offensive-dllhijack</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/02/offensive-dll.png</image:loc><image:title>offensive-dll</image:title></image:image><lastmod>2017-03-04T10:30:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/about/</loc><lastmod>2017-02-28T10:24:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://countuponsecurity.com/2017/01/12/extract-and-use-indicators-of-compromise-from-security-reports/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/01/extract-create-ioc.png</image:loc><image:title>extract-create-ioc</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2017/01/ioc-loop.png</image:loc><image:title>ioc-loop</image:title></image:image><lastmod>2017-01-16T14:03:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/11/17/2014-campaigns-of-cyber-espionage/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/11/apt-reports-1.png</image:loc><image:title>apt-reports-1</image:title></image:image><lastmod>2017-01-10T08:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/11/20/blockchain-brainwallet-cracking/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/11/brainflayer1.png</image:loc><image:title>brainflayer</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/11/generateaddress.png</image:loc><image:title>generateaddress</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/11/brainflayer.png</image:loc><image:title>brainflayer</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/11/allbalances.png</image:loc><image:title>allbalances</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/11/blockchainparsing.png</image:loc><image:title>blockchainparsing</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/11/runbitcoin.png</image:loc><image:title>runbitcoin</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/11/installbitcoin.png</image:loc><image:title>installbitcoin</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/11/generatebitcoinaddr.png</image:loc><image:title>generatebitcoinaddr</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/11/img_1293.jpg</image:loc><image:title>img_1293</image:title></image:image><lastmod>2017-11-22T23:12:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/10/17/rig-exploit-kit-analysis-part-3/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/10/rigekuac.png</image:loc><image:title>rigekuac</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/10/rigekshellcodedecoded.png</image:loc><image:title>rigekshellcodedecoded</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/10/rigekshellcodecreateproc.png</image:loc><image:title>rigekshellcodecreateproc</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/10/rigekshellcodeapildr.png</image:loc><image:title>rigekshellcodeapildr</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/10/rigexshellcodeolly.png</image:loc><image:title>rigexshellcodeolly</image:title></image:image><lastmod>2016-10-18T16:37:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/10/05/rig-exploit-kit-analysis-part-2/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/10/rigex-2ndstageflash.png</image:loc><image:title>rigex-2ndstageflash</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/10/rigeksulo.png</image:loc><image:title>rigeksulo</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/10/rigekfirststageflash.png</image:loc><image:title>rigekfirststageflash</image:title></image:image><lastmod>2016-10-06T09:05:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/09/30/rig-exploit-kit-analysis-part-1/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/09/rigieexploit.png</image:loc><image:title>rigieexploit</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/09/rigekflash.png</image:loc><image:title>rigekflash</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/09/rigeklanding.png</image:loc><image:title>rigeklanding</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/09/rigex2.png</image:loc><image:title>rigex2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/09/rigexafraiddnsreply.png</image:loc><image:title>rigexafraiddnsreply</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/09/rigex1.png</image:loc><image:title>rigex1</image:title></image:image><lastmod>2016-10-06T09:04:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/06/22/browser-exploit-against-ssltls/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/06/ssl.png</image:loc><image:title>ssl</image:title></image:image><lastmod>2016-10-03T10:53:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/06/14/jonh-the-ripper-cheat-sheet/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/06/jtr-cheatsheetimg.png</image:loc><image:title>jtr-cheatsheetimg</image:title></image:image><lastmod>2016-09-21T20:05:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/11/23/digital-forensics-supertimeline-event-logs-part-i/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/python-evtx.png</image:loc><image:title>python-evtx</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/wevtutil.png</image:loc><image:title>wevtutil</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/windowstimelineevtx.png</image:loc><image:title>windowstimelineevtx</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/windowsauditpolicy3.png</image:loc><image:title>windowsauditpolicy3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/windowsauditpolicy2.png</image:loc><image:title>windowsauditpolicy2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/windowsauditpolicy.png</image:loc><image:title>windowsauditpolicy</image:title></image:image><lastmod>2016-09-21T19:32:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/03/16/memory-forensics-with-volatility-on-remnux-v5-part-1/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-7.png</image:loc><image:title>memory-analysis-7</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-6.png</image:loc><image:title>memory-analysis-6</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-5.png</image:loc><image:title>memory-analysis-5</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-4.png</image:loc><image:title>memory-analysis-4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-3.png</image:loc><image:title>memory-analysis-3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-2.png</image:loc><image:title>memory-analysis-2</image:title></image:image><lastmod>2016-09-21T19:27:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/04/01/the-evil-bit/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/evilbit2.jpg</image:loc><image:title>Evilbit</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/ipv4header.jpg</image:loc><image:title>IPv4header</image:title></image:image><lastmod>2016-09-01T20:06:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/08/28/malware-analysis-dridex-loader-part-2/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-dllinject.png</image:loc><image:title>dridex-dllinject</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-regpersistence.png</image:loc><image:title>dridex-regpersistence</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-dllb64.png</image:loc><image:title>dridex-dllb64</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-httpreplyretrievedll.png</image:loc><image:title>dridex-httpreplyretrievedll</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-httpretrievemodule.png</image:loc><image:title>dridex-httpretrievemodule</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-nodeslist.png</image:loc><image:title>dridex-nodeslist</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-regsetvalue-clsid.png</image:loc><image:title>dridex-regsetvalue-clsid</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-regpersistclsid.png</image:loc><image:title>dridex-regpersistclsid</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-regvaluescslid.png</image:loc><image:title>dridex-regvaluescslid</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-httprespdecrypt.png</image:loc><image:title>dridex-httprespdecrypt</image:title></image:image><lastmod>2016-08-30T17:01:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/08/17/malware-analysis-dridex-loader-part-i/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-strings.png</image:loc><image:title>dridex-strings</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-datachunks.png</image:loc><image:title>dridex-datachunks</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-librariesdecoding.png</image:loc><image:title>dridex-librariesdecoding</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-xor-libraries.png</image:loc><image:title>dridex-xor-libraries</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-importsdecoding.png</image:loc><image:title>dridex-importsdecoding</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-xor-imports.png</image:loc><image:title>dridex-xor-imports</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/08/dridex-unpackedsample.png</image:loc><image:title>dridex-unpackedsample</image:title></image:image><lastmod>2016-09-15T18:44:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/06/29/the-abcs-of-a-cyber-intrusion/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/06/intrusion1.png</image:loc><image:title>Intrusion</image:title></image:image><lastmod>2016-06-29T16:05:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/11/10/digital-forensics-ntfs-metadata-timeline-creation/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/ntfsmetdata4.png</image:loc><image:title>ntfsmetdata4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/timeline-mftwindows41.png</image:loc><image:title>timeline-mftwindows4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/ntfsmetadata11.png</image:loc><image:title>ntfsmetadata1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/ntfssharesmb.png</image:loc><image:title>ntfssharesmb</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/ntfsmetadata3.png</image:loc><image:title>ntfsmetadata3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/ntfsmetadata2.png</image:loc><image:title>ntfsmetadata2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/timeline-mftwindows3.png</image:loc><image:title>timeline-mftwindows3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/timeline-mftwindows2.png</image:loc><image:title>timeline-mftwindows2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/timeline-mftwindows.png</image:loc><image:title>timeline-mftwindows</image:title></image:image><lastmod>2016-05-25T13:07:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/11/25/digital-forensics-supertimeline-event-logs-part-ii/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/windowstimelineevtx11.png</image:loc><image:title>windowstimelineevtx1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/logontypes1.png</image:loc><image:title>Logontypes</image:title></image:image><lastmod>2017-10-23T17:11:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/12/07/malware-analysis-dridex-process-hollowing/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/12/codealert.png</image:loc><image:title>codealert</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/12/dridex-writeprocessmem1.png</image:loc><image:title>dridex-writeprocessmem</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/12/dridex-writeprocessmem.png</image:loc><image:title>dridex-writeprocessmem</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/12/dridex-createprocessw.png</image:loc><image:title>dridex-createprocessw</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/12/dridex-ollydbg-brkpoint.png</image:loc><image:title>dridex-ollydbg-brkpoint</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/12/processhollowing.png</image:loc><image:title>processhollowing</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/12/dridex-processcreation.png</image:loc><image:title>dridex-processcreation</image:title></image:image><lastmod>2016-08-17T16:28:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/05/24/digital-forensics-dll-search-order/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/dllsearchorder-regedit.png</image:loc><image:title>dllsearchorder-regedit</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/dllsearchorder-iat.png</image:loc><image:title>dllsearchorder-iat</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/dllsearchorder-regiat.png</image:loc><image:title>dllsearchorder-regiat</image:title></image:image><lastmod>2016-05-24T20:28:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/05/18/digital-forensics-shimcache-artifacts/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/shimcache.png</image:loc><image:title>shimcache</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/shimcache-volatility.png</image:loc><image:title>shimcache-volatility</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/shimcache-parser.png</image:loc><image:title>shimcache-parser</image:title></image:image><lastmod>2016-05-20T06:52:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/05/16/digital-forensics-prefetch-artifacts/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/prefetch2.png</image:loc><image:title>prefetch</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/prefetch-winprefetch.png</image:loc><image:title>prefetch-winprefetch</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/prefetch-contents.png</image:loc><image:title>prefetch-contents</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/prefetch-metadata.png</image:loc><image:title>prefetch-metadata</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/prefetch-supertimeline2.png</image:loc><image:title>prefetch-supertimeline2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/prefetch-supertimeline.png</image:loc><image:title>prefetch-supertimeline</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/05/prefetch-rip.png</image:loc><image:title>prefetch-rip</image:title></image:image><lastmod>2016-05-16T15:49:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/papers/</loc><lastmod>2016-04-19T11:55:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://countuponsecurity.com/2016/04/11/evolution-of-stack-based-buffer-overflows/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/04/overflow.jpg</image:loc><image:title>overflow</image:title></image:image><lastmod>2019-01-09T11:10:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/03/09/unleashing-yara-part-3/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/03/yara-logo.jpg</image:loc><image:title>yara-logo</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/03/yara_3_8.png</image:loc><image:title>yara_3_8</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/03/yara_3_7.png</image:loc><image:title>yara_3_7</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_3_6.png</image:loc><image:title>yara_3_6</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_3_5.png</image:loc><image:title>yara_3_5</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_3_4.png</image:loc><image:title>yara_3_4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_3_3.png</image:loc><image:title>yara_3_3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_3_2.png</image:loc><image:title>yara_3_2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_3_1.png</image:loc><image:title>yara_3_1</image:title></image:image><lastmod>2017-08-10T08:42:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/02/29/retefe-banking-trojan/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/retefe-cscode.png</image:loc><image:title>retefe-cscode</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/maliciousapkinst3.png</image:loc><image:title>maliciousapkinst3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/maliciousapkinst5.png</image:loc><image:title>maliciousapkinst5</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/retefe-trafficdecoded.png</image:loc><image:title>retefe-trafficdecoded</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/retefe-apkcnctraffic1.png</image:loc><image:title>retefe-apkcnctraffic</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/retefe-apkcnctraffic.png</image:loc><image:title>retefe-apkcnctraffic</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/retefe-apkconfig.png</image:loc><image:title>retefe-apkconfig</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/mtan.png</image:loc><image:title>mtan</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/retefe-csmtan.png</image:loc><image:title>retefe-csmtan</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/retefe-cslogin.png</image:loc><image:title>retefe-cslogin</image:title></image:image><lastmod>2016-02-29T18:23:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/02/18/unleashing-yara-part-2/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yarapart2.png</image:loc><image:title>yarapart2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_2-1_11.png</image:loc><image:title>yara_2.1_1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/virus_blaster.jpg</image:loc><image:title>Virus_Blaster</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_2-1_6.png</image:loc><image:title>yara_2.1_6</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_2-1_5.png</image:loc><image:title>yara_2.1_5</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_2-1_31.png</image:loc><image:title>yara_2.1_3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_2-1_4.png</image:loc><image:title>yara_2.1_4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_2-1_2.png</image:loc><image:title>yara_2.1_2</image:title></image:image><lastmod>2016-02-19T08:01:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/02/15/exploit-kit-turf-wars/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/angler-uac1.png</image:loc><image:title>angler-uac</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/neutrino-tswbprx1.png</image:loc><image:title>neutrino-tswbprx</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/neutrino-secondstagetw.png</image:loc><image:title>neutrino-secondstagetw</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/angler-landingpage.png</image:loc><image:title>angler-landingpage</image:title></image:image><lastmod>2016-02-16T21:28:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/02/10/unleashing-yara-part-1/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/02/yara_logo.png</image:loc><image:title>yara_logo</image:title></image:image><lastmod>2016-02-10T18:14:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2016/01/06/neutrino-exploit-kit/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2016/01/neutrinoframework.png</image:loc><image:title>neutrinoframework</image:title></image:image><lastmod>2016-01-06T18:37:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/11/30/dridex-black-friday/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/blackcnctraffic.png</image:loc><image:title>blackcnctraffic</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/blackphishingmacro.png</image:loc><image:title>blackphishingmacro</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/blackphishingemail4.png</image:loc><image:title>blackphishingemail4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/blackphishingemail3.png</image:loc><image:title>blackphishingemail3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/blackphishingemail2.png</image:loc><image:title>blackphishingemail2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/blackfridayemail2.png</image:loc><image:title>blackfridayemail2</image:title></image:image><lastmod>2015-11-30T21:03:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/11/09/digital-forensics-evidence-acquisition-and-ewf-mounting/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/ewfmount11.png</image:loc><image:title>ewfmount1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/ewfmount1.png</image:loc><image:title>ewfmount</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/ewfacquisition.png</image:loc><image:title>ewfacquisition</image:title></image:image><lastmod>2015-11-09T20:35:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/11/07/cryptowall-strikes-back/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/cryptowallcomms.png</image:loc><image:title>cryptowallcomms</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/cryptowallprocess.png</image:loc><image:title>cryptowallprocess</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/cryptowallreg.png</image:loc><image:title>cryptowallreg</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/cryptowall3.png</image:loc><image:title>cryptowall3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/cryptowall4.png</image:loc><image:title>cryptowall4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/cryptowall1.png</image:loc><image:title>cryptowall1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/11/cryptowall.png</image:loc><image:title>cryptowall</image:title></image:image><lastmod>2015-11-08T18:52:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/10/20/course-review-sans-for578-cyber-threat-intelligence/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/10/killchain.png</image:loc><image:title>KillChain</image:title></image:image><lastmod>2015-10-20T10:48:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/10/13/malicious-office-document-delivering-dyre/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/10/email-dyre.png</image:loc><image:title>email-dyre</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/10/email-oledump2.png</image:loc><image:title>email-oledump2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/10/email-oledump1.png</image:loc><image:title>email-oledump1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/10/email-olevba1.png</image:loc><image:title>email-olevba1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/10/email-oletools.png</image:loc><image:title>email-oletools</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/10/email-dyre2.png</image:loc><image:title>email-dyre2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/10/email-dyre1.png</image:loc><image:title>email-dyre1</image:title></image:image><lastmod>2017-02-08T09:25:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/08/19/intro-to-cyber-threat-intelligence/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/08/knowyourenemy.png</image:loc><image:title>knowyourenemy</image:title></image:image><lastmod>2015-08-19T16:42:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/08/15/the-5-steps-of-the-intelligence-cycle/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/08/intelligencecycle.png</image:loc><image:title>intelligencecycle</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/08/intelprocess.png</image:loc><image:title>intelprocess</image:title></image:image><lastmod>2016-12-04T05:55:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/07/24/hacking-team-arsenal-of-cyber-weapons/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/07/hackingteam5.png</image:loc><image:title>hackingteam5</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/07/hackingteam45png.png</image:loc><image:title>hackingteam45png</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/07/hackingteam4.png</image:loc><image:title>hackingteam4</image:title></image:image><lastmod>2015-07-27T10:16:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/07/23/hacking-team-breach-summary/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/07/hackingteam2.png</image:loc><image:title>hackingteam2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/07/hackingteam3.png</image:loc><image:title>hackingteam3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/07/hackingteam1.png</image:loc><image:title>hackingteam1</image:title></image:image><lastmod>2015-07-24T22:04:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/05/19/hash-runner-ctf-2015/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/05/hashrunner1.png</image:loc><image:title>hashrunner1</image:title></image:image><lastmod>2015-05-21T06:40:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/05/07/step-by-step-clustering-john-the-ripper-on-kali/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/05/jtr-rules.png</image:loc><image:title>jtr-rules</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/05/jtr-mpi.png</image:loc><image:title>jtr-mpi</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/05/jtr-inst.png</image:loc><image:title>jtr-inst</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/05/jtr-nfs.png</image:loc><image:title>jtr-nfs</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/05/jtr-ssh.png</image:loc><image:title>jtr-ssh</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/05/jtr-network.png</image:loc><image:title>jtr-network</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/05/jtr-blog.jpg</image:loc><image:title>jtr-blog</image:title></image:image><lastmod>2021-08-18T14:21:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/04/30/thoughts-on-measuring-security-monitoring/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/04/measuring-stick.jpg</image:loc><image:title>Measuring-Stick</image:title></image:image><lastmod>2015-04-30T22:49:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/03/18/memory-forensics-with-volatility-on-remnux-v5-part-2/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-17.png</image:loc><image:title>memory-analysis-17</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-16.png</image:loc><image:title>memory-analysis-16</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-13.png</image:loc><image:title>memory-analysis-13</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-14.png</image:loc><image:title>memory-analysis-14</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-15.png</image:loc><image:title>memory-analysis-15</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-10.png</image:loc><image:title>memory-analysis-10</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-9.png</image:loc><image:title>memory-analysis-9</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/03/memory-analysis-8.png</image:loc><image:title>memory-analysis-8</image:title></image:image><lastmod>2015-04-18T12:14:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/03/10/redline-finding-evil-on-my-wife-laptop/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/redline-investigationsteps.png</image:loc><image:title>redline-investigationsteps</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/redline-steps.png</image:loc><image:title>redline-steps</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/windows7.png</image:loc><image:title>windows7</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/mandiant-redline.png</image:loc><image:title>mandiant-redline</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/redline-collectdata.png</image:loc><image:title>redline-collectdata</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/redline-agent.png</image:loc><image:title>redline-agent</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/redline-collectorscript.png</image:loc><image:title>redline-collectorscript</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/redline-analyzedata.png</image:loc><image:title>redline-analyzedata</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/redline-startsession.png</image:loc><image:title>redline-startsession</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/redline-loadingdata.png</image:loc><image:title>redline-loadingdata</image:title></image:image><lastmod>2017-10-24T08:35:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/12/21/computer-security-incident-handling-6-steps/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/12/incidentresponse1.png</image:loc><image:title>incidentresponse</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/12/incidentresponse.png</image:loc><image:title>incidentresponse</image:title></image:image><lastmod>2015-02-22T19:49:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/01/02/step-by-step-bot-infection-process-exploiting-bad-password/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/01/infectionprocess.png</image:loc><image:title>infectionprocess</image:title><image:caption>Bot Infection Process</image:caption></image:image><lastmod>2015-02-22T19:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/13/gamification/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/11/netwars.jpg</image:loc><image:title>NetWars</image:title><image:caption>NetWars - image used with permission from SANS</image:caption></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/11/netwars-logo.png</image:loc><image:title>netwars-logo</image:title></image:image><lastmod>2015-02-22T19:48:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/09/overlapping-ipv6-fragments/</loc><lastmod>2015-02-22T19:47:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/04/day-one-for-count-upon-security/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/11/lock1.png</image:loc><image:title>Count Upon Security</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/11/lock.png</image:loc><image:title>Count Upon Security</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/11/lock.jpg</image:loc><image:title>lock</image:title></image:image><lastmod>2015-02-22T19:46:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/10/26/pki-a-security-enabler/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/eid.png</image:loc><image:title>eID</image:title><image:caption>Retrieved from http://www.cartaodecidadao.pt/</image:caption></image:image><lastmod>2015-02-22T19:42:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/01/06/smtp-gateway-placement/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/01/smtp.jpg</image:loc><image:title>smtp</image:title></image:image><lastmod>2015-02-22T19:41:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/02/16/static-malware-analysis-find-malicious-intent/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/02/static-analysis-pestudio.png</image:loc><image:title>static-analysis-pestudio</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/02/static-analysis-dumpbin.png</image:loc><image:title>static-analysis-dumpbin</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/02/static-analysis-sysinternals.png</image:loc><image:title>static-analysis-sysinternals</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/02/static-analysis-fciv.png</image:loc><image:title>static-analysis-fciv</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/02/static-analysis-imports.png</image:loc><image:title>static-analysis-imports</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/02/static-analysis-strings.png</image:loc><image:title>static-analysis-strings</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/02/pev70.png</image:loc><image:title>pev70</image:title></image:image><lastmod>2016-07-18T06:11:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/02/11/security-hands-on-training-part-6-final/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/02/security-hot-fig29.png</image:loc><image:title>security-hot-fig29</image:title></image:image><lastmod>2015-02-11T20:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/01/26/security-hands-on-training-part-5-2/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig16.png</image:loc><image:title>security-hot-fig16</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig17.png</image:loc><image:title>security-hot-fig17</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig18.png</image:loc><image:title>security-hot-fig18</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig19.png</image:loc><image:title>security-hot-fig19</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig20.png</image:loc><image:title>security-hot-fig20</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig21.png</image:loc><image:title>security-hot-fig21</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig22.png</image:loc><image:title>security-hot-fig22</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig23.png</image:loc><image:title>security-hot-fig23</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig24.png</image:loc><image:title>security-hot-fig24</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig25.png</image:loc><image:title>security-hot-fig25</image:title></image:image><lastmod>2015-03-17T14:45:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/01/21/dynamic-malware-analysis-with-remnux-v5-part-2/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/procdot.png</image:loc><image:title>procdot</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/procdot-torrentlocker.png</image:loc><image:title>procdot-torrentlocker</image:title></image:image><lastmod>2017-04-12T15:33:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/01/18/security-hands-on-training-part-4/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig9.png</image:loc><image:title>security-hot-fig9</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig10.png</image:loc><image:title>security-hot-fig10</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig11.png</image:loc><image:title>security-hot-fig11</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig12.png</image:loc><image:title>security-hot-fig12</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig13.png</image:loc><image:title>security-hot-fig13</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig14.png</image:loc><image:title>security-hot-fig14</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig15.png</image:loc><image:title>security-hot-fig15</image:title></image:image><lastmod>2015-01-19T20:50:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/01/18/security-hands-on-training-part-3/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig5.png</image:loc><image:title>security-hot-fig5</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig6.png</image:loc><image:title>security-hot-fig6</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig7.png</image:loc><image:title>security-hot-fig7</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/security-hot-fig8.png</image:loc><image:title>security-hot-fig8</image:title></image:image><lastmod>2015-01-19T19:34:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/01/13/dynamic-malware-analysis-with-remnux-v5-part-1/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/malware-analysis-framework-burp2.png</image:loc><image:title>malware-analysis-framework-burp2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/malware-analysis-framework-burp.png</image:loc><image:title>malware-analysis-framework-burp</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/malware-analysis-framework-result1.png</image:loc><image:title>malware-analysis-framework-result1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/malware-analysis-framework1.png</image:loc><image:title>malware-analysis-framework</image:title></image:image><lastmod>2020-06-24T19:17:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/01/11/security-hands-on-training-part-2/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/hotsecurity-fig4a.png</image:loc><image:title>hotsecurity-fig4a</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/hotsecurity-fig4.png</image:loc><image:title>hotsecurity-fig4</image:title></image:image><lastmod>2015-01-14T19:11:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2015/01/08/security-hands-on-training-part-1/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/hotsecurity-fig3.png</image:loc><image:title>hotsecurity-fig3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/hotsecurity-fig2.png</image:loc><image:title>hotsecurity-fig2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2015/01/hotsecurity-fig1.png</image:loc><image:title>hotsecurity-fig1</image:title></image:image><lastmod>2015-01-14T19:10:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/10/24/malicious-documents-word-with-vba-and-powershell/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/feodo-emet.png</image:loc><image:title>feodo-emet</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/procdot.png</image:loc><image:title>ProcDot</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/feodo-docmechanics.png</image:loc><image:title>feodo-docmechanics</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/feodo-vba.png</image:loc><image:title>feodo-vba</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/feodordoc-procdot.png</image:loc><image:title>feodordoc-procdot</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/feodordoc-procdot2.png</image:loc><image:title>feodordoc-procdot2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/feodo-batchfile.png</image:loc><image:title>feodo-batchfile</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/feodo-powershell.png</image:loc><image:title>feodo-powershell</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/feodo-visualbasic.png</image:loc><image:title>feodo-visualbasic</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/feodo-doc.png</image:loc><image:title>feodo-doc</image:title></image:image><lastmod>2015-03-23T18:07:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/12/15/your-data-has-been-taken-hostage/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/12/ransomware1.png</image:loc><image:title>ransomware</image:title></image:image><lastmod>2015-01-03T17:10:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/10/06/shellshock-hands-on/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/shellshock-hands-21.png</image:loc><image:title>shellshock-hands-2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/shellshock-hands-31.png</image:loc><image:title>shellshock-hands-3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/shellshock-hands-3.png</image:loc><image:title>shellshock-hands-3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/shellshock-hands-1.png</image:loc><image:title>shellshock-hands-1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/shellshock-hands-code1.png</image:loc><image:title>shellshock-hands-code1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/shellshock-hands-code2.png</image:loc><image:title>shellshock-hands-code2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/shellshock-hands-2.png</image:loc><image:title>shellshock-hands-2</image:title></image:image><lastmod>2014-10-15T04:11:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/10/04/shellshock-highlights/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/shellshock-tweet.png</image:loc><image:title>shellshock-tweet</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/10/shellshock-timeline.png</image:loc><image:title>shellshock-timeline</image:title></image:image><lastmod>2014-10-06T07:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/08/29/intelligence-driven-incident-response/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/08/courseofaction.png</image:loc><image:title>courseofaction</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/08/killchain.png</image:loc><image:title>killchain</image:title></image:image><lastmod>2014-08-29T06:29:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/08/26/hands-on-training-to-develop-cyber-security-skills/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/08/abstract.png</image:loc><image:title>abstract</image:title></image:image><lastmod>2014-08-26T16:17:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/08/25/forensics-evidence-processing-super-timeline/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/08/supertimeline.png</image:loc><image:title>supertimeline</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/08/supertimeline-csv.png</image:loc><image:title>supertimeline-csv</image:title></image:image><lastmod>2014-08-25T09:05:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/08/07/evidence-acquisition-creating-a-forensic-image/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/08/helix-shot.jpeg</image:loc><image:title>helix-shot</image:title></image:image><lastmod>2014-08-06T20:16:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/08/06/computer-forensics-and-investigation-methodology-8-steps/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/08/sans-sift.png</image:loc><image:title>sans-sift</image:title></image:image><lastmod>2018-02-25T14:51:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/07/02/the-path-to-the-golden-ticket/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/07/goldenticket.png</image:loc><image:title>goldenticket</image:title></image:image><lastmod>2014-07-03T09:43:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/06/23/bitlocker-with-tpm-in-10-steps/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/locker.png</image:loc><image:title>locker</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/tpm-bios.png</image:loc><image:title>tpm-bios</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/tpm-init.png</image:loc><image:title>tpm-init</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/tpm-step2.png</image:loc><image:title>tpm-step2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/tpm-step3.png</image:loc><image:title>tpm-step3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/tpm-step4.png</image:loc><image:title>tpm-step4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/tpm-step5.png</image:loc><image:title>tpm-step5</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/tpm-step6.png</image:loc><image:title>tpm-step6</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/tpm-step7.png</image:loc><image:title>tpm-step7</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/tpm-step10.png</image:loc><image:title>tpm-step10</image:title></image:image><lastmod>2017-04-12T13:31:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/06/09/malware-analysis/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/06/malwareanalysis.png</image:loc><image:title>malwareanalysis</image:title></image:image><lastmod>2014-06-09T22:45:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/05/29/simple-and-practical-attack-part-2/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/05/oracle.png</image:loc><image:title>oracle</image:title></image:image><lastmod>2014-05-29T19:08:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/05/17/simple-and-practical-attack-part-1/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/05/tamper.png</image:loc><image:title>tamper</image:title></image:image><lastmod>2014-05-18T17:38:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/04/18/heartbleed-got-prime-number/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/primenumber1.png</image:loc><image:title>primenumber</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/primenumber.png</image:loc><image:title>primenumber</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/rsa.png</image:loc><image:title>RSA</image:title></image:image><lastmod>2014-04-19T18:05:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/04/12/heartbleed-openssl-bug/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/hearbleed.png</image:loc><image:title>hearbleed</image:title></image:image><lastmod>2014-04-18T21:28:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/03/31/indicators-of-compromise-iocs/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/indicators1.png</image:loc><image:title>indicators</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/indicators.png</image:loc><image:title>indicators</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/03/malware.png</image:loc><image:title>malware</image:title></image:image><lastmod>2014-04-06T20:52:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/04/07/finding-evil-on-my-wifes-laptop-part-ii/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/digitalartifacts.png</image:loc><image:title>digitalartifacts</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/redline-recentanalysis.png</image:loc><image:title>redline-recentanalysis</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/redline-analysisinfo.png</image:loc><image:title>redline-analysisinfo</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/redline-options.png</image:loc><image:title>redline-options</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/redline-processes.png</image:loc><image:title>redline-processes</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/redline-processfulldetail.png</image:loc><image:title>redline-processfulldetail</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/redline-iocreportcreation.png</image:loc><image:title>redline-iocreportcreation</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/redline-iocresults1.png</image:loc><image:title>redline-iocresults1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/04/redline-iocresults2.png</image:loc><image:title>redline-iocresults2</image:title></image:image><lastmod>2019-04-05T15:52:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/02/27/reverse-engineering-and-malware-analysis/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/02/malware.png</image:loc><image:title>malware</image:title></image:image><lastmod>2014-03-02T00:19:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/01/24/could-we-ask-john-connor-to-bring-his-atari-and-bypass-this/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/01/winnt-atm.png</image:loc><image:title>Winnt-ATM</image:title></image:image><lastmod>2014-02-01T03:30:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2014/01/05/bitcoin-my-story/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2014/01/bitcoin_global.jpg</image:loc><image:title>bitcoin_global</image:title><image:caption>Image retrieved from Bitcoin.org</image:caption></image:image><lastmod>2014-01-22T00:52:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/11/08/cve-october-awareness-bulletin/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/11/msbulletin-october.png</image:loc><image:title>msbulletin-october</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/11/cve-october.png</image:loc><image:title>cve-october</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/11/cve-september.png</image:loc><image:title>CVE-</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/11/msbulletin-september.png</image:loc><image:title>MSBulletin-September</image:title></image:image><lastmod>2013-12-11T11:41:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/12/11/cve-november-awareness-bulletin/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/12/cve-october.png</image:loc><image:title>cve-october</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/12/cve-november1.png</image:loc><image:title>cve-november</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/12/cve-november.png</image:loc><image:title>cve-november</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/12/msbulletin-november.png</image:loc><image:title>msbulletin-november</image:title></image:image><lastmod>2013-12-11T11:39:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/08/27/cve-august-awareness-bulletin/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/08/cve-table-august1.png</image:loc><image:title>CVE-table-August</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/08/cve-august2.png</image:loc><image:title>CVE-August</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/08/nsm-signatures.png</image:loc><image:title>NSM-Signatures</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/08/checkpoint-signatures.png</image:loc><image:title>Checkpoint-Signatures</image:title></image:image><lastmod>2013-11-08T14:37:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/11/04/crypto-basics/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/symetric.png</image:loc><image:title>Symetric crypto</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/assymetric.png</image:loc><image:title>Assymetric crypto</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/hashing.png</image:loc><image:title>Hashing function</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/signing.png</image:loc><image:title>Digital signing</image:title></image:image><lastmod>2013-11-04T22:25:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/10/21/security-mechanisms-powered-by-pki/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/digital-key.png</image:loc><image:title>digital-key</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/key.png</image:loc><image:title>key</image:title></image:image><lastmod>2013-10-22T16:56:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/17/insider-threat-dee-crypt/</loc><lastmod>2013-10-20T13:25:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/06/tavis-ormandy-strikes-again/</loc><lastmod>2013-10-20T13:24:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/05/common-criteria-information-technology-security-evaluation-2/</loc><lastmod>2013-10-20T13:21:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/07/start-with-334-ips/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/11/blocklists1.png</image:loc><image:title>Block Lists</image:title><image:caption>Block Lists</image:caption></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/11/blocklists.png</image:loc><image:title>Block Lists</image:title><image:caption>Block Lists</image:caption></image:image><lastmod>2013-10-20T13:21:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/23/hands-on-lab-ecommerce-part-1/</loc><lastmod>2013-10-20T13:18:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/12/07/deception-techniques/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/12/deception.png</image:loc><image:title>deception</image:title></image:image><lastmod>2013-10-20T13:17:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/12/01/watch-out-the-wireless-neighbors/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/12/aircrack.png</image:loc><image:title>AirCrack</image:title></image:image><lastmod>2013-10-20T13:16:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/22/pcap-attack-trace-honeynet-challenges-part-1/</loc><lastmod>2013-10-20T13:12:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/11/27/nmap-6-scripting-engine-with-400-scripts/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/11/nmap.png</image:loc><image:title>nmap</image:title></image:image><lastmod>2013-10-20T13:11:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/12/26/honeypot-captures-bad-villain/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/12/legendbot.png</image:loc><image:title>legendbot</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/12/botmaster.png</image:loc><image:title>botmaster</image:title></image:image><lastmod>2013-10-20T13:10:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/01/03/sans-comes-to-zurich-starting-january-23/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/01/sans-mentor.png</image:loc><image:title>sans-mentor</image:title></image:image><lastmod>2013-10-20T13:09:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/10/19/justin-case-steals-sam-part-ii/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/truecrypt.png</image:loc><image:title>TrueCrypt</image:title></image:image><lastmod>2013-10-20T12:48:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/10/18/justin-case-steals-sam-part-i/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/cain3.png</image:loc><image:title>Cain3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/cain2.png</image:loc><image:title>Cain2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/cain1.png</image:loc><image:title>Cain1</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/onpre5.png</image:loc><image:title>ONPRE5</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/onpre4.png</image:loc><image:title>ONPRE4</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/onpre3.png</image:loc><image:title>ONPRE3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/onpre2.png</image:loc><image:title>ONPRE2</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/onpre.png</image:loc><image:title>ONPRE</image:title></image:image><lastmod>2013-10-19T13:54:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/10/08/cve-september-awareness-bulletin/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/cve-september1.png</image:loc><image:title>cve-september</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/10/msbulletin-september.png</image:loc><image:title>MSBulletin-September</image:title></image:image><lastmod>2013-10-08T17:49:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/09/23/cve-2013-3893-isc-threat-level-yellow/</loc><lastmod>2013-09-22T18:21:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/06/18/ssl-handshake-protocol/</loc><lastmod>2013-06-18T21:10:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2013/04/21/behavioral-android-malware-analysis-with-remnux-and-mobisec/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/phone1365-contact1.png</image:loc><image:title>phone1365-contact</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/phone1365-posts.png</image:loc><image:title>phone1365-posts</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/phone1365-gps.png</image:loc><image:title>phone1365-GPS</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/phone1365-contact.png</image:loc><image:title>phone1365-contact</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/phone1365.png</image:loc><image:title>phone1365</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/android-php-ok.png</image:loc><image:title>android.php-OK</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/android-php.png</image:loc><image:title>android.php</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/wireshark-malware-3.png</image:loc><image:title>wireshark-malware-3</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/malware-chulia.jpg</image:loc><image:title>malware-chuliA</image:title></image:image><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2013/04/http-logs-empty.png</image:loc><image:title>HTTP-logs-empty</image:title></image:image><lastmod>2013-09-11T06:31:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com/2012/12/15/enjoy-great-coffee-and-the-internet-at-your-fingertips/</loc><image:image><image:loc>https://countuponsecurity.com/wp-content/uploads/2012/12/free-wifi-starbucks.png</image:loc><image:title>free-wifi-starbucks</image:title></image:image><lastmod>2012-12-16T14:10:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://countuponsecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2021-08-18T14:21:13+00:00</lastmod></url></urlset>
