"This simple tool logs usernames and passwords from authentication attempts against an OpenSSH server you control.
"This simple tool logs usernames and passwords from authentication attempts against an OpenSSH server you control.
Yann Malherbe released several VHDX artifacts, as described in his detailed blog post. [1]
Yann Malherbe released several VHDX artifacts, as described in his detailed blog post. [1]
"This behavioral monitoring signature gets triggered if the file Rclone.exe has been observed residing in a suspicious folder on a device." [2]
"This behavioral monitoring signature gets triggered if the file Rclone.exe has been observed residing in a suspicious folder on a device." [2]
dfir.ch/posts/today_...
dfir.ch/posts/today_...
While reading the HTB write-up for Certificate, I learned about SeManageVolumePrivilege. [1]
A video by Grzegorz Tworek goes into great detail about how to abuse SeManageVolumePrivilege.[2]
While reading the HTB write-up for Certificate, I learned about SeManageVolumePrivilege. [1]
A video by Grzegorz Tworek goes into great detail about how to abuse SeManageVolumePrivilege.[2]
The first image is from the official documentation and shows how easily you can build your own test scenario. The second image shows the results from a tenant where I ran the test.
The first image is from the official documentation and shows how easily you can build your own test scenario. The second image shows the results from a tenant where I ran the test.
Maester is a PowerShell-based test automation framework that helps you stay in control of your Microsoft security configuration. Such a cool tool - test details can be filtered by passed, failed, and skipped. Failed tests come with detailed recommendations on how to do better.
Maester is a PowerShell-based test automation framework that helps you stay in control of your Microsoft security configuration. Such a cool tool - test details can be filtered by passed, failed, and skipped. Failed tests come with detailed recommendations on how to do better.
Love that Minesweeper reference here :) They tried hard to blend in; however, certain metadata about a file is baked into the PE header. Attackers can rename binaries all they want, but fields like original_file_name or inconsistencies in headers often give them away.
Love that Minesweeper reference here :) They tried hard to blend in; however, certain metadata about a file is baked into the PE header. Attackers can rename binaries all they want, but fields like original_file_name or inconsistencies in headers often give them away.
In today's BEC (Business E-Mail Compromise) case, I stumbled (again) over the "Set-MailboxJunkEmailConfiguration" operation. I talked about it a while back. [1]
The attacker also created a new Inbox rule for moving incoming emails for target personnel to a designated folder.
In today's BEC (Business E-Mail Compromise) case, I stumbled (again) over the "Set-MailboxJunkEmailConfiguration" operation. I talked about it a while back. [1]
The attacker also created a new Inbox rule for moving incoming emails for target personnel to a designated folder.
labs.infoguard.ch/posts/automa...
labs.infoguard.ch/posts/automa...
My first keynote will be about how we spend billions on (cyber) security but remain insecure. I’ll use a recent case as an example, which my colleague Asger Deleuran Strunk investigated:
My first keynote will be about how we spend billions on (cyber) security but remain insecure. I’ll use a recent case as an example, which my colleague Asger Deleuran Strunk investigated:
Mandiant mentioned the User Access Logs in their newest report [1]. We use the UAL extensively in our investigations, as this artifact can retain logs for a longer period of time, as outlined by Mandiant (and also covered in my Anti-Forensics presentation).
Mandiant mentioned the User Access Logs in their newest report [1]. We use the UAL extensively in our investigations, as this artifact can retain logs for a longer period of time, as outlined by Mandiant (and also covered in my Anti-Forensics presentation).
.chm file, VBScript, PowerShell, batch file, JavaScript, PowerShell, Steganography (the data from the image is used to reflectively load a .NET assembly).. 😮
.chm file, VBScript, PowerShell, batch file, JavaScript, PowerShell, Steganography (the data from the image is used to reflectively load a .NET assembly).. 😮