mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

577
comptes actifs

#detectionengineering

0 message0 participant0 message aujourd’hui

Hey Hey People,

DA Here.

Do you, have a Suricata sensor in your network?

Do you, use Suricata as a part of sandbox that you run?

Have you, been hammering away at finding evil, and want to find more?

I'm doing a webinar courtesy of OISF this Thursday. 3PM UTC, which translates to 10am EST.

I'll be talking about two things during this meeting: One, is making good use of the ET INFO rule category as an early warning system.

Sure, there is a lot of noise to sift out of ET INFO, and for that reason, some choose to just cut it entirely. I'm here to show you how to grab the stuff we've seen in our sandboxes that can help to lead anomaly detection.

In the second part of this talk, I will talk about how you can convert network and system-specific artifacts into a set of Honeytoken-like IDS rules that again, can lead to anomaly detection, and perhaps even catching advanced or unidentified threats.

Here is a link to register for the meeting: us02web.zoom.us/webinar/regist

ZoomWelcome! You are invited to join a webinar: Honeytoken IDS rules and ET INFO Rules for Anomaly Detection with Tony Robinson. After registering, you will receive a confirmation email about joining the webinar.This talk is going to be a double header, focusing on ways to spot anomalous activity for threats that may or may not have specific signatures. First, Tony will the value the ET INFO rule category can provide in spotting some of this anomalous activity. He'll discuss the rules use that provide value in spotting unusual activity, and how attendees can customize the ET INFO rule category to better suit their needs. The second part of this talk will show attendees how to use system specific artifacts to create IDS rules that can detect exfiltration of this data, for detecting anomalous activity. He'll also discuss using cyberchef to tranform and encode this data in various ways to create rules to detect obfuscation methods attackers use when exfiltrating this information. If there is time, Tony will talk about collaboration he has done with the maintainers of the secureworks dalton project that might make development of rules like this much easier.

"Sweet QuaDreams or Nightmare before Christmas? Dissecting an iOS 0-Day" (Christine Fossaceca & Bill Marczak)

Things I learned:
BlastDoor is the sandbox for objects in messages on iOS. (curious if something similar exists in macOS?)
The keychain is a target of attacks on iOS too.
Persistence is hard on iOS, and some attackers just don't bother. If you're exploit is good enough, you can just re-exploit the device after a reboot.

Other notes:
There's a cute theoretical attack on the Zecops blog "No Reboot" where you can fake the reboot screen so the user thinks they've rebooted their device when they actually haven't.
QuaDream subverted iCloud 2FA by giving false dates to the process that generates TOTP codes. Malware can generate/cache TOTP codes that are valid at future times.
QuaDream stored XML data in a backdated calendar item. At the time, backdated calendar items didn't generate notifications.
QuaDream used triggering events to decide when to send data - i.e. screen locked or unlocked.

#detectionengineering
For iOS, code executing from /private/var/db/com.apple.xpc.roleaccountd/staging/ is sus. (True for macOS as well?)
A system process that doesn't normally make a network connection uploading data (for QuaDream, BackupAgent was used)

OBTS link: objectivebythesea.org/v7/talks

BlackHat Slides: i.blackhat.com/EU-23/Presentat

objectivebythesea.org#OBTS v7.0: TalksConference Talks

I'm in a weird position professionally and guess I am looking for a #mentor ? Maybe just someone more experienced than me to talk to and not necessarily some long term commitment of expectations? Growth just isn't going to happen where I'm at and I think I keep getting stuck in an under-/overqualified limbo.

Mainly work in #malwareanalysis #threatintel #detectionengineering with heavy #programming skills.

Always see #CyberMentoringMonday does it do anything?

News from #SIGMA team: 'One of the most requested features for Sigma in the last years was the ability to express correlation searches. Since Sigma was introduced, its main focus was set on matching single log events. The first version of the Sigma specification defined a syntax for piped aggregation expressions, but this first approach to match multiple events in defined combinations had various issues & some important aspects were underspecified. blog.sigmahq.io/introducing-si #detectionengineering

Sigma_HQ · Introducing Sigma Correlations - Sigma_HQPar Thomas Patzke

I've been going through this series trying to better understand how I can work with my purple team to integrate our threat intel in their workflow and the author brought up something I'd like to elaborate on:

"Detection hints from ATT&CK are also rather generic, since a Technique is itself a concept which clusters different procedures together. Thus, while ATT&CK can give a direction of what a SOC needs to develop, it doesn’t give a way to achieve detection objectives; which is the detection engineer core concern."

I agree that ATT&CK itself is vague. It has its purpose but not so much for the defensive side. When talking about a specific technique, I like to add in the D3FEND ontology to provide more specific artifacts that can be used to narrow the scope of what to look for. In a hunt fashion, I'll add MITRE's Cyber Analytics Repository (CAR) for pseudocode implementations.

So long as you prioritize the (sub)technique that you want detection engineers to focus on, these three sources alone I feel can help CTI teams further explain the threat and assess control coverage.

medium.com/anton-on-security/b
#DetectionEngineering #ThreatIntel #CTI #MITRE

Anton on Security · Build for Detection Engineering, and Alerting Will Improve (Part 3)Par Anton Chuvakin

Thrilled to launch So You Want to be a SOC Analyst? 2.0 -- Now, with no requirements to run your own VMs!

SYWTBSA 2.0 enables paid subscribers of my blog to dive into this 6-part threat detection & response lab using a fully self-contained, cloud hosted VM. Also, much of the setup steps have been taken care of for you, enabling you to dive right into the best parts of the lab.

Also, this version of SYWTBSA has been tweaked and revamped specially for this cloud-hosted version.

Check it out here: blog.ecapuano.com/p/so-you-wan #SOC #socanalyst #detectionengineering #dfir #secops #infosec

Eric’s Substack · So you want to be a SOC Analyst? 2.0Par Eric Capuano

At this point I have taught or advised hundreds of aspiring hackers. I've provided instructional content to thousands more.

I can count on one hand the number of times an aspirant has told me they want to go into defensive cybersecurity.
#DFIR, #ThreatHunting, #DetectionEngineering...these ain't lighting up the imagination of the padawans.

But I constantly see mid-career pentesters/red teamers decide to move over to defense for one reason or another.

Which leads me to conclude that we've made a fatal flaw in
#CyberSecurity training. Since a defender must understand attacks anyhow, I am coming to the conclusion that all technical cybersecurity training should begin with the offensive skills. Then mix in the defense. I believe seeing both sides like this might make defense more appealing earlier—and produce better defenders.

I’m excited to launch our latest online course, YARA for Security Analysts.

We built this course for people who want to learn to write YARA rules for detection engineering, system triage, incident response, and threat intelligence research.

In the course, you’ll learn how to use YARA to detect malware, triage compromised systems, and collect threat intelligence. No prior YARA experience is required.

You can learn all about the course and register here: networkdefense.co/courses/yara.

It's discounted right now for launch.

I recently wrote an article on #Linux #Ransomware - I was surprised to see that more often than not, variants that have a “Linux” version are really targeting the hypervisor and encrypting the virtual memory.

It’s an import distinction as your #EDR / #Logging will not see a binary execute on the host VMs - you’ll want to ensure your #Hypervisor #Logs are being sent to your #SIEM

signalblur.io/through-the-look

#FOSS #Unix #Virtualization #Cloud #RHEL #OpenSource #OpenSuse #CTI #Malware #InfoSec #CyberSecurity #Intel #DetectionandResponse #DetectionEngineering

(Re-posting as killing off all of the JavaScript on my site accidentally messed up the metadata when I share links 🙃 all fixed now)

signalblurThrough the Looking Glass: A Deep Dive into Linux Ransomware ResearchOver the past few weeks, I have done a deep dive into the public research available on Linux Ransomware, seeking to understand the broader landscap...

Want to identify many popular lateral movement techniques?

Master psexec.

Many lateral movement techniques embedded within popular attack tools like Meterpreter, Beacon, and others, behave very very similarly to psexec, just with added obfuscation.

If you thoroughly understand how psexec works, you'll learn to spot many other tools.

praetorian.com/blog/threat-hun

PraetorianThreat Hunting: How to Detect PsExec -This article profiles the use of the PsExec command-line tool as a cyber-attack technique, and how threat hunters can detect it.
#DFIR#secops#detection