I've updated my #Splunk#ThreatHunting app
- User fields to all panels (#Sysmon 13.30)
- New File Prevalence dashboard
- Newly observed hashes dashboard
- New Sysmon tuning dashboard
- Several bug fixes
- Updated the downloadable lookup files
splunkbase.splunk.com/app/43…
My latest blog post on how in memory JXA exec, dylib exec, keylogging, and other techniques look through the lens of Apple’s ESF 🔎: cedowens.medium.com/taking-e…
In this blog post, I show you my step-by-step process for automating Azure abuse research. In this example I'm be looking at Azure Virtual Machines and their Managed Identities, based on original research by Karl Fosaaen (@kfosaaen): posts.specterops.io/automati…
(1/2) Happy Friday! Wrote a quick post formalizing the Windows Events surrounding gMSA attacks into SPL queries. H/T to @SemperisTech, @Stealthbits and @mubix for providing the initial detection research
Defender AV started flagging part of my #sysmon config as a ‘Trojan’ nothing to worry about, it’s the bit looking for tampering commands on the command line. Hope it gets addressed soon by @msftsecurity
Does anyone know what the status is of API Monitor? Is in dead? Will it ever get an update or be open sourced? I have so many usecases and/or feature requests…🤯
Cc: @rohitab
The Invoke-ATHMSI gives the caller the ability to enter in at various levels to execute MSI files to best mimic attacker behavior.
We leveraged the abstraction map below to help identify entry points an attacker could/would take.
Today, @jsecurity101 and I added Get/New/Invoke-ATHMSI to AtomicTestHarnesses. These functions allow you to automate parsing, building, and executing MSI files with a wide range of customization and test output for defenders.
github.com/redcanaryco/Atomi…
Today is the day folks!
Graph X-Ray is now available for download from all your favourite app stores.
graphxray.merill.net/
Credits to the awesome team Dhruv, Clement, @Eunixnho & @mumbihere
🧵👇🏾
The new FalconFriday is out and focuses on detecting attacks that abuse malicious modifications to Active Directory, for example, in relaying attacks. Our detections give you a head start in identifying known and unknown attacks that rely on these changes!
medium.com/falconforce/falco…
Have you been wanting to present at one of our conferences?
Well, now is your chance!! Our Call For Papers is open for Deadwood 2022.
Submit your paper here. Deadline is June 26, 2022. ➡️ wildwesthackinfest.com/deadw…#cfp#Deadwood2022
A new update with AccessChk v6.15, RAMMap v1.61 and Sysmon v13.34 has now been posted!
Get the tools at sysinternals.com
See what's new on the Sysinternals Blog: techcommunity.microsoft.com/…
The first blog post is here. This one covers the technical details of CVE-2022-26923 (Active Directory Domain Services Elevation of Privilege Vulnerability).
The vulnerability was patched as part of the May 2022 Security Updates from Microsoft.
research.ifcr.dk/9e098fe298f…
New blog post about an adventure I had with pre-created computer accounts. Let me tell you, old computer accounts can be fun!
Ended up creating an impacket script and a PR to the SharpHound ingestor as part of my adventure 🔥
Feedback is appreciated
trustedsec.com/blog/diving-i…
🦅 Get your early-bird tickets for our #BHUSA training before 29 May!
Join our Advanced Detection Engineering for Windows training: a 4-day, in-person, very hands-on training on building advanced, resilient detections in Las Vegas! 🏜️
More details: blackhat.com/us-22/training/…
Happy Monday 🙂
Over the past week or so @exploitph, @4ndr3w6S, and myself came together to look into the Kerberos Relay attack. During that time we decided it would be good to create a write-up about it. Here it is -
jsecurity101.medium.com/defe…