Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @xknow_infosec
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @xknow_infosec
-
xknow proslijedio/la je Tweet
interesting sample, uses ShellWindows COM to bypass suspicious office child processes, try to download calc.bin from a likely legit/compromised bitcoin related website: https://app.any.run/tasks/29e2b46d-407b-493b-aee4-550159622ce3/ …pic.twitter.com/8XJDj4i6ZJ
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
Hunting in Sentinel is now in public preview so you can get started with livestream sessions and check it outhttps://docs.microsoft.com/en-us/azure/sentinel/livestream …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
Actually, that was a tracker. "Steve" is using an iPhone and is in Lagos, Nigeria (using the same IP address as Katy, who received a slightly different file).pic.twitter.com/XcMkTW1bEz
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
CredAccess: some keyword you can add to the list of suspicious powershell scriptblock keywords_list, you can also monitor suspicious ImageLoad of the 2 highlighted ones (see below) Tool: https://github.com/nccgroup/SCOMDecrypt …pic.twitter.com/W8QKjdfzUa
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
Proof-of-concept exploits published for the Microsoft-NSA crypto bug (CVE-2020-0601) * Two are public (via
@KudelskiSec &@ollypwn), at least one is private (@saleemrash1d) * People are calling this bug CurveBall now https://www.zdnet.com/article/proof-of-concept-exploits-published-for-the-microsoft-nsa-crypto-bug/ …pic.twitter.com/H6lPnjdnBg
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC https://github.com/ollypwn/cve-2020-0601 …pic.twitter.com/QKIaWrRQFL
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
That epic Microsoft moment

#cve20200601#curveball Recently worked on#mimikatz and ECC, so yes, 10 and 2016/2019 only. Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones)pic.twitter.com/EayEuFVv1JPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
No fancy EDR required to capture CVE-2020-0601 attempts (after patching). Just ensure you're forwarding Application log events. Currently, CVE-2020-0601 is the only Microsoft code (AFAIK) that calls the CveEventWrite API so event noise is not a concern. https://docs.microsoft.com/en-us/windows/win32/api/securitybaseapi/nf-securitybaseapi-cveeventwrite …pic.twitter.com/JWPnaMaIqB
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
Sigma rule to detect the exploitation of CVE-2020-0601 as noted by
@mattifestation Reference https://twitter.com/mattifestation/status/1217179698008068096 … - built-in feature, no Sysmon required - rule is generic & detects all future events generated by this source Rule https://github.com/Neo23x0/sigma/blob/master/rules/windows/builtin/win_audit_cve.yml …pic.twitter.com/GpemX1l4bN
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Detect possible upcoming exploits of CVE-2020-0601 (vuln in Win CryptoAPI, Elliptic Curve Cryptography) VIA Zeek --> https://github.com/0xxon/cve-2020-0601 … <-- full credits to Johanna A.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
Great technical thread on doing incident investigation on boxes owned with
#Shitrixhttps://twitter.com/darkQuassar/status/1217253393955049472 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
Azure AD privilege escalation - Taking over default application permissions as Application Admin - Azure AD security ==
@_dirkjan just saying
#infosec#pentest#redteam https://dirkjanm.io/azure-ad-privilege-escalation-application-admin/ …pic.twitter.com/lcW90HwXAQHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
If you haven't done so already, go download and update UFED to 7.28! Make sure you hit the correct portal to update: https://community.cellebrite.com/
#checkm8@Cellebrite_UFED#DFIRpic.twitter.com/4QB3FP10rDHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
CVE-2019-19781 Live Response First Steps ========================= Some tips on how to go about running a micro-compromise assessment on Netscaler boxes, this is what I've been using: >>> Check the root user command history: history /1
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
#sysmon traces of this new LM tool can be found in the ATT&CK_EVTX repo : https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES/blob/master/Lateral%20Movement/LM_wmi_PoisonHandler_Mr-Un1k0d3r_sysmon_1_13.evtx … https://github.com/Mr-Un1k0d3r/PoisonHandler …pic.twitter.com/13715E1W4Z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
A perfect summary of the Windows CryptoAPI spoofing vulnerability CVE-2020-0601 that Microsoft patched today. Like the old adage says, two screenshots are worth a thousand words. https://twitter.com/subTee/status/1217300590696501249 …
Tweet je nedostupan.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
xknow proslijedio/la je Tweet
Finding service accounts: * Account has a SPN * kerberos delegation configured * password not changed in over $(Policy time) * svc or service or SQL in name That should help get you started.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
Most defenders know about the
@MITREattack matrix for Windows, but did you also know there's one for Linux? Want to see it in action? Read this post by a MSTIC analyst on a#Linux threat seen in#Azure:
https://azure.microsoft.com/en-us/blog/learning-from-cryptocurrency-mining-attack-scripts-on-linux/ …
https://attack.mitre.org/matrices/enterprise/linux/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
xknow proslijedio/la je Tweet
I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: https://posts.specterops.io/mimidrv-in-depth-4d273d19e148 … 1/3
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
InfoSec Enthusiast
Always up for new intel
Deep Dive!
