Florian Roth  

@cyb3rops

Nextron Systems | Passionate Detection Engineer | Creator of , Aurora agent, Sigma, LOKI, yarGen, Valhalla, Raccine

Frankfurt, Germany
Liittynyt kesäkuu 2013

Twiitit

Olet estänyt käyttäjän @cyb3rops

Haluatko varmasti nähdä nämä twiitit? Twiittien näyttäminen ei poista käyttäjän @cyb3rops estoa.

  1. 3 tuntia sitten
    Kumoa
  2. 3 tuntia sitten

    I would obviously include China, North Korea and Iran in these filters to treat them equally

    Näytä tämä ketju
    Kumoa
  3. 3 tuntia sitten

    To be fair, the Russian aggression against Ukraine would only be the trigger and not the cause. We are not allowed to & refrain from selling to certain countries but we give away "Lite" versions for free. RU's invasion is just the trigger that reminded me of that idea.

    Näytä tämä ketju
    Kumoa
  4. 4 tuntia sitten

    I consider disabling my free tools on systems with certain language and time zone settings e.g. "Russian" language + timezone somewhere within "Russia" > "sorry, I can't run here" Opinions?

    Näytä tämä ketju
    Kumoa
  5. 8 tuntia sitten

    Here's an example of what happens when the test fails because one of your new rules in a PR triggered on goodware activity

    Näytä tämä ketju
    Kumoa
  6. uudelleentwiittasi
    21. helmik.

    Qbot and Zerologon Lead To Full Domain Compromise ➡️Discovery: Net, Nltest, AdFind, etc ➡️Persistence: Scheduled Task ➡️Privilege Escalation: Zerologon CVE-2020-1472 ➡️Lateral Movement: Remote Services & RDP ➡️Exfil: C2 Channel ➡️C2: & Qbot

    Näytä tämä ketju
    Kumoa
  7. 22. helmik.

    In a call: "How should I check if this CSR can be signed." "Oh, there's an online tool that does exactly that." "With their CA key?" "Or with yours. You can choose." "Hm, interesting. No, not today."

    Kumoa
  8. 21. helmik.

    They won't tell you, but that's why you get called on a Saturday afternoon by a friend who "just wanted to download Photoshop"

    Kumoa
  9. 21. helmik.

    It's easy to get 30 TB of malware. It's much harder to get 30 TB of goodware. It's also easy to get logs of malware detonations and attacks. It's much harder to get events of active and used systems that are clean. To develop good detection rules, you need plenty of both

    Kumoa
  10. 21. helmik.

    Good news! We now have a test workflow that checks every new Sigma rule provided in a PR against a collection of EVTX files from a clean Win10 system We receive donations in form of EVTX files 🙏😌 PR Our repo with EVTX

    Näytä tämä ketju
    Kumoa
  11. 21. helmik.

    I wonder how many IOCs in your IOC management platform could be replaced with this simple rule? 1000? 10,000? more? Is a SH256 of a phishing doc sent out last year in May still important?

    Kumoa
  12. 20. helmik.

    It appears that people, especially during their first contact with Sigma, tend to believe that the main value resides in the converter. I don’t think that. The collection of 1000+ rules finally allows us to answer the question “what should I look for in the collected logs?”

    Kumoa
  13. uudelleentwiittasi
    19. helmik.

    People coming into infosec today wont know a world before SIGMA detections. Our industry is maturing and we’re all better for it. Absolute game changer for defenders.

    Kumoa
  14. 19. helmik.

    Is there someone that could put me in contact with the guys at Microsoft that work on ETW? We've found some bugs/deficiencies in the "Microsoft-Windows-Kernel-Registry" channel, that I'd like to discuss / fix / improve for everyone using that channel

    Kumoa
  15. uudelleentwiittasi
    18. helmik.

    We investigated the recent attack against Iranian Broadcasting and discovered tools utilized in this operation, including the evidence of usage of destructive wiper malware. This suggests that the damage might be more serious than officially reported.

    Kumoa
  16. 18. helmik.

    I was looking for an example to test drive Aurora in a video recording today or tomorrow. Maybe I'll show the webshell detection as an example.

    Näytä tämä ketju
    Kumoa
  17. 18. helmik.

    Webshell detection with Sigma rules (and logs that contain parent > child process information) I just noticed that I mentioned the other webshell detection rule in my talk "Sigma hall of fame" - but both rules are great

    Näytä tämä ketju
    Kumoa
  18. 18. helmik.

    🙌 And the award for the most ingenious phishing theme goes to ...🥇

    Kumoa
  19. uudelleentwiittasi
    17. helmik.

    Puzzled why a yara rule did or didn't match? Let me introduce , a web-based ! With , you can see the: 1⃣ evaluation steps 2⃣ matched strings 3⃣ relationship among the rules

    Näytä tämä ketju
    Kumoa
  20. uudelleentwiittasi
    17. helmik.

    Exploiting the vulnerability, the detections of the ASP/Webshell shot up by almost 160% in T3. Most of them were registered in Germany 🇩🇪. 2/3

    Näytä tämä ketju
    Kumoa

Lataaminen näyttää kestävän hetken.

Twitter saattaa olla ruuhkautunut tai ongelma on muuten hetkellinen. Yritä uudelleen tai käy Twitterin tilasivulla saadaksesi lisätietoja.

    Saatat pitää myös

    ·