Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @SBousseaden
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SBousseaden
-
some exploits tend to load directly ntoskrnl.exe (indows Kernel) to do some offsets calcs for some critical kernel structs or global vars ... in normal condition this should be rare so won't harm to add it to your sysmon/EDR config.pic.twitter.com/VDststNMUQ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
high likely fake
#winnti sample detected: macro code in this doc is similar to the one reported below used to exec hermes ransomware :) https://app.any.run/tasks/b87d950b-c1c4-41ea-aae6-ed855a54e8a5/ … https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/password-protected-word-document-delivers-hermes-ransomware/ … https://www.welivesecurity.com/2020/01/31/winnti-group-targeting-universities-hong-kong/ …pic.twitter.com/7aG4ZbqGex
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Samir proslijedio/la je Tweet
Getting DNS Client Cached Entries with CIM/WMIhttps://www.darkoperator.com/blog/2020/1/14/getting-dns-client-cached-entries-with-cimwmi …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
in-memory traces of ppldump, exploiting zam64.sys vulndriver to dump lsass memory, cool stuff. sysmon will show a generic\noisy calltrace so detection chances here are low, if combined with lsass loading dbgcore.dll it may work. https://github.com/realoriginal/ppldump … https://github.com/SouhailHammou/Exploits …pic.twitter.com/rbXCtivW3M
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
some notes/inputs to take into consideration while investigating persistence via service (hijack existing or/and add new rogue svchost hosted service)pic.twitter.com/EkYJiLrXXx
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Local Groups Discovery: those are the top observed system processes that do some sort of local groups membership discovery (source: eventid 4799), if you see for instance rundll32 in there that something worth further checks (e.g. cmdline, netcons etc.)pic.twitter.com/Glo4knnLK3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
simple
#threathunting yara rule to detect suspicious windows servicedll, e.g. 2nd match is related to#Konni APT sample "mshlpsrvc.dll"pic.twitter.com/VN6vtcPYpj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Samir proslijedio/la je Tweet
Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption https://waleedassar.blogspot.com/2020/01/malformed-pe-header-kernel-denial-of.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Samir proslijedio/la je Tweet
For today "side lolbin" let's say thanks to: ZOHO Corporation private Limited with their dctask64.exe. Keep injecting all the dll we want with: dctask64.exe injectDll <dllpath> <PID> bonus point: we have the outputs!!! cc
@Oddvarmoe@Hexacorn https://www.virustotal.com/gui/file/a1b55abba46db5836ab3050bd754aed462e7361744e7f9f6ab55427ecb35d761/relations …pic.twitter.com/x1B6bNQk6J
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
another macro with safe landing (no susp child processes): c2: ssl.securelogonweb\.com, backdoor: cobaltstrike, persis:startupfolder, other:cactustorch, wmic+xsl https://app.any.run/tasks/4a40a89c-bddd-4df8-993e-5732d8a52133/ …pic.twitter.com/9baHl5lnnp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
for espionage based attacks, "high" # of copying data from usb to a tmp staging c:\ folder is expected, other than monitoring cmd.exe's cmdline "*copy*e|f|g:*.pdf|.doc|etc.. .*c:\*" any other ideas?pic.twitter.com/xmtWpMYohM
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
finally a macro sample using something other than ps as a wmiprvse child process :) https://app.any.run/tasks/2f64ab4f-b405-4462-830c-03cbdf475216/ …pic.twitter.com/oci6S4ItBH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
interesting sample using "over-sizing" likely to bypass AV scan, md5: 15af764731c257caf1ee26d1cfc049a9pic.twitter.com/mJcERFL6Q1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
interesting sample, using minimal macro to write to startup folder for persistence & uses IE via COM to download 2 txt files (no noisy ps or abnormal exec). https://app.any.run/tasks/866b7e6a-4657-4a1f-bba9-44bfb42b7390/ …pic.twitter.com/NPlTC35ZeH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
processes that use bits in windows, SCCM client, browsers, outlook, onedrive & some update programs, powershell one was for testing thus it's not that frequent to have it there and if so likely the transfer job name will be known and can be baselined.pic.twitter.com/Vcm4IK6Qcf
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
some "äudit evasion" keywords/cmdlets to watch in "MSExchange Management" event logs or online exchange admin audit logs --> https://docs.microsoft.com/en-us/exchange/policy-and-compliance/admin-audit-logging/log-structure?view=exchserver-2019 …pic.twitter.com/U0QonNPdM4
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
2020: still "2" lines of code to get browsers saved creds and so many security products with no resilient detection/prevention for the same issuepic.twitter.com/ieIUMZDtnt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Samir proslijedio/la je Tweet
The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr
@PetrBenes as Hypervisor From Scratch could never have existed without his help and to Alex@aionescu for patiently answering my questions.https://rayanfam.com/topics/hypervisor-from-scratch-part-7/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#detection learned lessons here are: a) alert on file writes to startup folder by office processes (not noisy) b) monitor continuous network connections from cscript.exePrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.