Rezultati pretraživanja
  1. 28. sij

    tip: when you share hashes for malicious files, share also the size. Many tools are able to search based on multiple conditions: (size < x) && (hash == x) This will decrease the analysis time!

  2. 28. sij

    "DFIR ORC was designed for forensic use from the start". presenting the open source tool released by at

  3. 28. sij

    RDAP replaces whois, and returned formatted JSON, which is good for automation. You can use « nicinfo » tool, which parse the result for you.

    Prikaži ovu nit
  4. 28. sij

    The speaker for this talk is TLP:white

  5. 28. sij

    Conclusion: automated static analysis: comparing the binaries on target router with binaries on a « clean » router to detect compromission.

    Prikaži ovu nit
  6. 28. sij

    Attack simulation on the iOS-XR router

    Prikaži ovu nit
  7. 28. sij

    Showing graph structure with connections between processes from the memory dump.

    Prikaži ovu nit
  8. 28. sij

    In IOS XR, Cisco removed the 'chmod' command. To execute your binary, upload one with +x bit set and overwrite it with yours ;)

  9. 28. sij

    Remember the "router-forensics" project by ? () Everything changes and, today, we have tools for Cisco IOS XR!

  10. 28. sij

    Next session from Solal Jacob, working for on memory analysis on Cisco IOS-XR 32 bits router

    Prikaži ovu nit
  11. 28. sij

    First solution for a SOC will be to block PasteBin, which is not bullet proof. 1. Signatures from network sensors: vulnerable to basic variants 2. Sandbox: first target for evasion (anti-vm/sandbox in powershell is frequent) 3. EDR 4. SIEM No NTA? ;)

    Prikaži ovu nit
  12. 28. sij

    Interesting talk, but fast pace, so tough to comment. Powershell example summary:

    Prikaži ovu nit
  13. 28. sij

    Funny fact, security researchers are searching only what does not allow :)

  14. 28. sij

    Next conference is on Pastebin usage

    Prikaži ovu nit
  15. 28. sij

    No, it’s not a DDoS... Just the effect of credential stuffing on a login page...

  16. 28. sij

    Two numbers: 52%... of users use the same pwd everywhere 85%... of users re-use pwd on e-commerce sites

  17. 28. sij

    Interesting analysis of data leaks. Not how stolen data are (ab)used but how they are leaked...

  18. 28. sij

    Even attackers benefit from increased computing power...

  19. 28. sij

    Next converence from Sebastien Merio, head of CSIRT from OVH « Data leakage and credential stuffing »

    Prikaži ovu nit
  20. 28. sij

    Conclusion is boring but important: In the cloud too, prepare and monitor before you need it.

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.