Found an interesting detail during a DFIR case:
On macOS, the last log does not record all SSH logins.
When an attacker runs:
ssh [email protected] "command"
the login won’t show up in last.
⚠️ This means attackers can bypass the usual login traces.
😈 ChromeAlone - Transform Chromium browsers into a C2 Implant.
A la Cobalt Strike or Meterpreter.
@defcon talk and tool release by @praetorianlabs' Michael Weber.
ChromeAlone contains a number of out of the box components, including:
- A malicious Chrome extension that can…
A critical server’s login sources are usually limited to a few stable IPs
⚠️ When a new, unfamiliar IP suddenly shows up in the logs—
it could be the first sign of an intrusion
🎯 New Challenge: 《IP Access Baseline Deviation Detection》
👀 Can you detect it right away?…
🎣 New Detection Challenge Live!
We've just released our latest security detection challenge: "Double Extension Spoofing"
Double extension spoofing is a classic phishing technique where attackers disguise executable files as regular documents. Can you spot this phishing trick?…
🚨 Just released: Browser Credential Theft Detection Challenge! 🕵️♂️🔐
It covers credential theft methods for multiple browsers 🛡️
Test if you can complete the challenge and validate your detection rules!
👇 Try it now:soc-labs.top/en/detections/…#ThreatDetection#BlueTeam#SIEM…
🚨 New Detection Challenge! 🚨
SOCLabs just launched a Password Spraying & Credential Access Detection challenge!
Test your SIEM query skills and see if you can catch the attack.
Ready to level up? Try it now on SOCLabs! 🔍💻
👉 soc-labs.top/en/detections/…#CyberSecurity#SIEM…
ClickFix variant targeting Mac users through X ads. Tries tricking users into "cleaning" their Macs by running a terminal command. Domain: hxxps://top-fixer[.]com/?p=141 Distributes install[.]sh file: virustotal.com/gui/file/525be…
Thanks for the shoutout to the Zen of Security Rules
br0k3nlab.com/resources/zen-…
Cool initiative to see this applied to threat hunting as well 🤙
Thanks for sharing @_w0rk3r
Thanks for the shoutout to the Zen of Security Rules
br0k3nlab.com/resources/zen-…
Cool initiative to see this applied to threat hunting as well 🤙
Thanks for sharing @_w0rk3r
An increased visibility into threads' call stacks helps with more reliable malware detection.
The approach is based on ETW telemetry and module's Export Directory data for information enrichment.
A post by John Uhlmann of @elasticseclabs. Great read!
#redteam#blueteam#maldev…
Used Claude to generate a Splunk query to hunt for browser exploits and potential @mrd0x#FileFix#clickfix like behaviors in Sysmon Process Create events. Ran it in a fortune 50 environment and for a 7 day period only had 200~ events out of 200 Million
pastebin.com/PJGZuArj
Did you know that you can kerberoast without any valid credentials? All you need is an account that is ASREProastable.
This allows you to request service tickets for any account with a set SPN🔥
NetExec now has a native implementation of this technique, thanks to Azox
4K Followers 5K FollowingСлава Україні! Most important job: being Dad; I also love to help people deny attackers the opportunity to break and steal all the things. Pronouns: He/him
25K Followers 26K FollowingA Hacker who is A Lover of People, and Life @RetroTwinz @Secbsd, @GrumpyHackers, @NovaHackers, @deadpixelsec @hacknotcrime Advocate @PositivelyBlue_ OSCP, OSWP
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
9 Followers 323 FollowingResearch & Intel & Hunt & Detection & Response
cyber-topic retweets from this account are an archive of things that I will research, not intended to spam
2K Followers 917 FollowingTech Lead, security intel @elastic @elasticseclabs via @endgameinc | security research | detection engineering | bench press: 455lbs & 📈 | I like my own tweets
88 Followers 372 FollowingNetwork Security student @AOU_KSAB| Learning #Security+ & #N+ | SOC blue team defense & web security | trying to make sense of the world of cybersecurity
26K Followers 1K FollowingSenior Security Consultant @TrustedSec | Military grade meme poster, researcher, cloud penetration tester, voider of warranties. My thoughts are my own.
2K Followers 2K FollowingCISO and faculty by day, adversary emulation/tools by night, bad jokes and memes all the time.
Profile photo image credit to Tib3rius.
My dog disapproves.
2K Followers 1K Following.ooM | InfoSec's answer to Mr Rogers | Yesterday. Today. Tomorrow | Advocate of women in tech & LGBTQ+ | Just be nice to each other
39K Followers 1K FollowingHead of Research and Discovery (RAD) @Google Threat Intelligence Group via @Mandiant acquisition. Posts are attributable to me—not my employer.
Former @USMC.
4K Followers 5K FollowingСлава Україні! Most important job: being Dad; I also love to help people deny attackers the opportunity to break and steal all the things. Pronouns: He/him
25K Followers 26K FollowingA Hacker who is A Lover of People, and Life @RetroTwinz @Secbsd, @GrumpyHackers, @NovaHackers, @deadpixelsec @hacknotcrime Advocate @PositivelyBlue_ OSCP, OSWP
20K Followers 2K FollowingPrincipal Identity Security Researcher at Microsoft. Ex-Secureworks. (MSc, MEng, PhD, CITP, CCSK).
And yes, opinions are my own ;)
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.