<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Unit42 on KinJih's space</title><link>https://kinjih.github.io/en/tags/unit42/</link><description>Recent content in Unit42 on KinJih's space</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 KinJih</copyright><lastBuildDate>Mon, 10 Jun 2024 22:02:04 +0800</lastBuildDate><atom:link href="https://kinjih.github.io/en/tags/unit42/index.xml" rel="self" type="application/rss+xml"/><item><title>HTB Sherlock Unit42 Writeup</title><link>https://kinjih.github.io/en/posts/htb+sherlock+unit42+writeup/</link><pubDate>Mon, 10 Jun 2024 22:02:04 +0800</pubDate><guid>https://kinjih.github.io/en/posts/htb+sherlock+unit42+writeup/</guid><description>A HackTheBox Sherlock Unit42 investigation walkthrough using Sysmon events to reconstruct malicious download, dropped files, and the UltraVNC infection flow.</description></item></channel></rss>