I am/was burnt sienna goose
I am/was burnt sienna goose
▶️ https://www.youtube.com/watch?v=uSYvHUVU8xY
🔄 RT/Reshare if you find this useful! 🚀
#WindowsSecurity #SDDL #Cybersecurity #Splunk #AtomicRedTeam
▶️ https://www.youtube.com/watch?v=uSYvHUVU8xY
🔄 RT/Reshare if you find this useful! 🚀
#WindowsSecurity #SDDL #Cybersecurity #Splunk #AtomicRedTeam
🔗 https://research.splunk.com/stories/defense_evasion_or_unauthorized_access_via_sddl_tampering/
🧠 Mind Map:
🔗 https://github.com/MHaggis/SDDLMaker/tree/main/MindMap
🧵 (5/)
🔗 https://research.splunk.com/stories/defense_evasion_or_unauthorized_access_via_sddl_tampering/
🧠 Mind Map:
🔗 https://github.com/MHaggis/SDDLMaker/tree/main/MindMap
🧵 (5/)
👉 https://thesddlmaker.streamlit.app/
📜 Read the full blog:
🔗 https://www.splunk.com/en_us/blog/security/windows-security-sddl-guide-access-control.html
🧵 (4/)
👉 https://thesddlmaker.streamlit.app/
📜 Read the full blog:
🔗 https://www.splunk.com/en_us/blog/security/windows-security-sddl-guide-access-control.html
🧵 (4/)
1️⃣ How attackers exploit SDDL—event log tampering, service hardening, & more
2️⃣ How to decode SDDL strings & analyze permissions, DACLs, and ACEs
3️⃣ How to defend against SDDL abuse with detections & Atomic Red Team tests
🧵 (3/)
1️⃣ How attackers exploit SDDL—event log tampering, service hardening, & more
2️⃣ How to decode SDDL strings & analyze permissions, DACLs, and ACEs
3️⃣ How to defend against SDDL abuse with detections & Atomic Red Team tests
🧵 (3/)
🔹 How attackers—from LockBit to RomCom—manipulate it for privilege escalation & defense evasion
🔹 How to detect & defend 🛡️
🧵 (2/)
🔹 How attackers—from LockBit to RomCom—manipulate it for privilege escalation & defense evasion
🔹 How to detect & defend 🛡️
🧵 (2/)
🔥 Tools for Testing:
➡️ Apache Builder: https://buff.ly/4fOt8F9
➡️ IIS Builder: https://buff.ly/4fLGySm
Empower your security team to hunt, detect, and patch gaps before attackers exploit them. 🛡️
Test, learn, and refine! #CyberSecurity #ThreatHunting #WebShellDetection
🔥 Tools for Testing:
➡️ Apache Builder: https://buff.ly/4fOt8F9
➡️ IIS Builder: https://buff.ly/4fLGySm
Empower your security team to hunt, detect, and patch gaps before attackers exploit them. 🛡️
Test, learn, and refine! #CyberSecurity #ThreatHunting #WebShellDetection
1️⃣ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2️⃣ Grab a webshell of choice, upload it, and start testing!
3️⃣Observe logs, alerts, and behaviors to identify gaps in your coverage.
1️⃣ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2️⃣ Grab a webshell of choice, upload it, and start testing!
3️⃣Observe logs, alerts, and behaviors to identify gaps in your coverage.
Use these servers to validate analytic coverage for:
🗂️ File modifications (webshell uploads)
⚙️ Process executions (commands from shells)
🎯 Suspicious behaviors triggered by shells
Use these servers to validate analytic coverage for:
🗂️ File modifications (webshell uploads)
⚙️ Process executions (commands from shells)
🎯 Suspicious behaviors triggered by shells