Kirk Sayre

@bigmacjpg

Cyber security researcher.

Vrijeme pridruživanja: siječanj 2018.

Tweetovi

Blokirali ste korisnika/cu @bigmacjpg

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bigmacjpg

  1. prije 2 sata

    Personally I'm not very sad that AV flags this file. If its a business process it should be reworked.

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    For the past few months, I've been diving into Apple's Endpoint Security Framework. This post shares how I use the framework for detection engineering purposes.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    30. sij

    On successful compromise of the user endpoint, the red team deployed their ultimate weapon

    Poništi
  4. proslijedio/la je Tweet
    25. sij
    Poništi
  5. proslijedio/la je Tweet
    23. sij

    Jscript dropper: Decoy doc suggests Poland FI targeting. Drops and executes what look like ? Gotta love the pokemon image dropped

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    20. sij

    2020: still "2" lines of code to get browsers saved creds and so many security products with no resilient detection/prevention for the same issue

    Poništi
  7. proslijedio/la je Tweet
    20. sij

    Perhaps to honor Acad. Sendov's memory, I should tell you the story about how our Lab was created. So, gather 'round the fire, kids, etc., etc. It's story time...

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    16. sij

    interesting sample, uses ShellWindows COM to bypass suspicious office child processes, try to download calc.bin from a likely legit/compromised bitcoin related website:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    17. sij

    Fattura-17.01.20.xls d4df569ab928bbdd99d30d87e5b6c9c394f3b221b2c9a4ae410be56e9affd64c dropped from https://att-0748.fileshare-storage[.]com/download.php c2: https://reselling-corp[.]com/2020hny thx urlhaus!

    Poništi
  10. proslijedio/la je Tweet
    15. sij

    Microsoft added Event ID 1 to the Application Log to show attempted exploitation of CVE-2020-0601 (via new CveEventWrite function). Use Splunk? Collect that EID and alert on: sourcetype=WinEventLog EventCode=1 LogName=Application Message="*[CVE-2020-0601]*" (tweak as needed)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    15. sij

    Slides from my talk on MacOS detections and post infection analysis: . Gave shoutouts to and . Thanks to everyone who attended!

    Poništi
  12. proslijedio/la je Tweet
    14. sij
    Poništi
  13. proslijedio/la je Tweet
    11. sij

    Nothing says "have a nice weekend" better than releasing a zero day exploit on a late Friday evening

    Prikaži ovu nit
    Poništi
  14. 13. sij
    Poništi
  15. proslijedio/la je Tweet
    13. sij

    Heads up! Emotet is back and just re-started it's spam campaigns 📨 Doc (MD5): aead1225141fadd849a27de8a27d16be Payload delivery URLs via URLhaus:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    11. sij

    I often hear: 'but, but attackers will use a modified version of my tool to evade the detection method that you've just published' Truth is, 98% of attackers use your tools exactly as you've dropped them.

    Poništi
  17. 8. sij
    Poništi
  18. 7. sij

    is an interesting maldoc. The VBA pops up a custom password box and the shell payload is only executed if the entered password begins with a 'c' or 'C'. Low detection rate and will foil sandboxes. Hits http[:]//quickwaysignstx[.]com/view.php for 2nd stage.

    Poništi
  19. proslijedio/la je Tweet
    31. pro 2019.

    this one is also one of my favorite quick-hunts to check for the occurence of any rogue shell (cmd.exe) based on top seen publicly abused (servicedll, dll via rundll32, injection) parent processes, below an e.g. for zxshell remote shell behavior

    Poništi
  20. proslijedio/la je Tweet
    1. sij

    Open-sourcing was one of my goals for 2019, but I failed this one. I resumed the development, and did some refactoring, but it’s not ready yet - sorry! I’m moving this goal to 2020.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·