Tweetovi

Blokirali ste korisnika/cu @xknow_infosec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @xknow_infosec

  1. proslijedio/la je Tweet
    16. sij

    interesting sample, uses ShellWindows COM to bypass suspicious office child processes, try to download calc.bin from a likely legit/compromised bitcoin related website:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    17. sij

    Hunting in Sentinel is now in public preview so you can get started with livestream sessions and check it out

    Poništi
  3. proslijedio/la je Tweet
    14. sij

    Actually, that was a tracker. "Steve" is using an iPhone and is in Lagos, Nigeria (using the same IP address as Katy, who received a slightly different file).

    105.112.58.199 - - [14/Jan/2020:16:59:33 +0000] "GET /redeem HTTP/1.1" 302 215 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 12_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.1.2 Mobile/15E148 Safari/604.1" TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
    105.112.58.199	NG	Lagos,
Lagos,
Nigeria,
Africa	105.112.58.0/24
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    15. sij

    CredAccess: some keyword you can add to the list of suspicious powershell scriptblock keywords_list, you can also monitor suspicious ImageLoad of the 2 highlighted ones (see below) Tool:

    Poništi
  5. proslijedio/la je Tweet
    16. sij

    Proof-of-concept exploits published for the Microsoft-NSA crypto bug (CVE-2020-0601) * Two are public (via & ), at least one is private () * People are calling this bug CurveBall now

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    16. sij

    CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    That epic Microsoft moment❤️ Recently worked on and ECC, so yes, 10 and 2016/2019 only. Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones)

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    14. sij

    No fancy EDR required to capture CVE-2020-0601 attempts (after patching). Just ensure you're forwarding Application log events. Currently, CVE-2020-0601 is the only Microsoft code (AFAIK) that calls the CveEventWrite API so event noise is not a concern.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    15. sij

    Sigma rule to detect the exploitation of CVE-2020-0601 as noted by Reference - built-in feature, no Sysmon required - rule is generic & detects all future events generated by this source Rule

    Poništi
  10. 15. sij

    Detect possible upcoming exploits of CVE-2020-0601 (vuln in Win CryptoAPI, Elliptic Curve Cryptography) VIA Zeek --> <-- full credits to Johanna A.

    Poništi
  11. proslijedio/la je Tweet

    Great technical thread on doing incident investigation on boxes owned with

    Poništi
  12. proslijedio/la je Tweet
    15. sij

    Azure AD privilege escalation - Taking over default application permissions as Application Admin - Azure AD security == just saying 😅

    Poništi
  13. proslijedio/la je Tweet
    15. sij

    If you haven't done so already, go download and update UFED to 7.28! Make sure you hit the correct portal to update:

    Poništi
  14. proslijedio/la je Tweet
    15. sij

    CVE-2019-19781 Live Response First Steps ========================= Some tips on how to go about running a micro-compromise assessment on Netscaler boxes, this is what I've been using: >>> Check the root user command history: history /1

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    14. sij
    Poništi
  16. proslijedio/la je Tweet
    15. sij

    A perfect summary of the Windows CryptoAPI spoofing vulnerability CVE-2020-0601 that Microsoft patched today. Like the old adage says, two screenshots are worth a thousand words.

    Tweet je nedostupan.
    Poništi
  17. proslijedio/la je Tweet
    14. sij

    We'll see and APT move laterally via RDP using Windows service accounts. Configure your to alert when you see type 10 remote interactive logons from Windows service accounts. You may be surprised as what you see. 😀

    Poništi
  18. proslijedio/la je Tweet
    15. sij
    Odgovor korisnicima

    Finding service accounts: * Account has a SPN * kerberos delegation configured * password not changed in over $(Policy time) * svc or service or SQL in name That should help get you started. 👍

    Poništi
  19. proslijedio/la je Tweet
    14. sij

    Most defenders know about the matrix for Windows, but did you also know there's one for Linux? Want to see it in action? Read this post by a MSTIC analyst on a threat seen in : 👉 🔗

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·