Teymur (@heirhabarovt) 's Twitter Profile
Teymur

@heirhabarovt

Threat Hunter | GCFA | GXPN | GDSA | Head of Cyber Defense Center at BI.ZONE

ID: 833071490832666624

calendar_today18-02-2017 21:51:35

1,1K Tweet

1,1K Followers

294 Following

Jon Hencinski (@jhencinski) 's Twitter Profile Photo

Once a month we get in front of our exec/senior leadership team and talk about #SOC performance relative to our business goals (grow ARR, retain customers, improve gross margin). A 🧵on how we translate business objectives to SOC metrics.

Once a month we get in front of our exec/senior leadership team and talk about #SOC performance relative to our business goals (grow ARR, retain customers, improve gross margin). 

A 🧵on how we translate business objectives to SOC metrics.
Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

If you are responsible for Win11 security baseline, please use the new (I mean fixed after 20+ years) configuration option "Enable MPR notifications" under Windows Components\Windows Logon Options. Defaults allow to read cleartext credentials from Winlogon with a simple DLL.

If you are responsible for Win11 security baseline, please use the new (I mean fixed after 20+ years) configuration option "Enable MPR notifications" under Windows Components\Windows Logon Options.
Defaults allow to read cleartext credentials from Winlogon with a simple DLL.
rootsecdev (@rootsecdev) 's Twitter Profile Photo

Will have to write a post on abusing SeManageVolumePrivilege This exploit grants full permission on C:\ drive for all users on the machine. GitHub - CsEnox/SeManageVolumeExploit github.com/CsEnox/SeManag…

Chetan Nayak (Brute Ratel C4 Author) (@ninjaparanoid) 's Twitter Profile Photo

Some EDRs catch indirect syscalls with callstack analysis. Here is a totally new technique which build a clean callstack originating from ntdll to avoid detections. No ROP required and tested and works against every EDR. Enjoy! 🔥 0xdarkvortex.dev/hiding-in-plai…

Some EDRs catch indirect syscalls with callstack analysis. Here is a totally new technique which build a clean callstack originating from ntdll to avoid detections. No ROP required and tested and works against every EDR. Enjoy! 🔥

0xdarkvortex.dev/hiding-in-plai…
Antonio Cocomazzi (@splinter_code) 's Twitter Profile Photo

🔥 Brace yourself #LocalPotato is out 🥔 Our new NTLM reflection attack in local authentication allows for arbitrary file read/write & elevation of privilege. Patched by Microsoft, but other protocols may still be vulnerable. cc Andrea Pierini Enjoy! 👇 localpotato.com/localpotato_ht…

Mor Davidovich (@dec0ne) 's Twitter Profile Photo

Me and @idov31 are happy to introduce HWSyscalls, a new method to execute indirect syscalls using Hardware Breakpoints without calling directly to ntdll.dll, therefore bypassing the current way to detect it. A detailed blog post will follow soon. github.com/Dec0ne/HWSysca…

Antonio Cocomazzi (@splinter_code) 's Twitter Profile Photo

Cool discovery 😎 Can be used also to weaponize arbitrary file write vulnerabilities. As a bonus, check the screenshot on how to weaponize #LocalPotato with this StorSvc DLL hijacking to get a SYSTEM shell.

Cool discovery 😎 
Can be used also to weaponize arbitrary file write vulnerabilities.
As a bonus, check the screenshot on how to weaponize #LocalPotato with this StorSvc DLL hijacking to get a SYSTEM shell.
William Burgess (@joehowwolf) 's Twitter Profile Photo

My first blog at CS - Dynamically spoofing call stacks with timers: cobaltstrike.com/blog/behind-th… PoC: github.com/Cobalt-Strike/…

Oleg Skulkin (@oskulkin) 's Twitter Profile Photo

#ThreatIntel #DFIR We've identified a new #WatchWolf campaign, who is behind #DarkWatchman backdoor. This time they are using SEO poisoning instead of phishing emails to deliver the backdoor. Check our blog for details: bi.zone/eng/expertise/…

FalconForce Official (@falconforceteam) 's Twitter Profile Photo

We have launched the 1st part of a new series of blog posts about automation for blue teams. In this first episode, we focus on dangerous misconfigurations in Azure AD. JMP RSP explains how to identify these (some aren’t even visible in your Azure Portal) falconforce.nl/automating-thi…

We have launched the 1st part of a new series of blog posts about automation for blue teams. In this first episode, we focus on dangerous misconfigurations in Azure AD. <a href="/0xffhh/">JMP RSP</a> explains how to identify these (some aren’t even visible in your Azure Portal)
falconforce.nl/automating-thi…
Teymur (@heirhabarovt) 's Twitter Profile Photo

Some days ago I and Maksim Tumakov provided talk about Hunting for macOS attack techniques on @PHDays12. Slides are available now! #ThreatHunting #ThreatDetection #DFIR #SOC #incidentresponse #PHDays12 speakerdeck.com/heirhabarov/hu…

Soufiane (@s0ufi4n3) 's Twitter Profile Photo

A TA going by the handle Spyboy is selling an AV/EDR killer that is allegedly capable of killing almost every AV/EDR on the market. streamable.com/ys07we streamable.com/h9n16x

A TA going by the handle Spyboy is selling an AV/EDR killer that is allegedly capable of killing almost every AV/EDR on the market.

streamable.com/ys07we
streamable.com/h9n16x
Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

If you play with the NTFS USN Journal, you could spot "enableRangeTracking" feature and/or fsutil.exe switch. Does it look like something useful in #DFIR scenarios? What it is all about? The 🧵⬇

If you play with the NTFS USN Journal, you could spot "enableRangeTracking" feature and/or fsutil.exe switch. Does it look like something useful in #DFIR scenarios? What it is all about? The 🧵⬇
an0n (@an0n_r0) 's Twitter Profile Photo

poor man's browser pivot through chrome remote debugging.🔥 no need to inject into iexplorer anymore.💪 just came across this awesome solution shared by Tim McGuffin long ago: gist.github.com/NotMedic/b1ab7… and this is also working with msedge (it shares the same chromium engine)!🎉

poor man's browser pivot through chrome remote debugging.🔥

no need to inject into iexplorer anymore.💪

just came across this awesome solution shared by <a href="/NotMedic/">Tim McGuffin</a> long ago: gist.github.com/NotMedic/b1ab7…

and this is also working with msedge (it shares the same chromium engine)!🎉
Ptrace Security GmbH (@ptracesecurity) 's Twitter Profile Photo

This map lists the essential techniques to bypass anti-virus and EDR github.com/CMEPW/BypassAV #Pentesting #bypass #CyberSecurity #Infosec

This map lists the essential techniques to bypass anti-virus and EDR github.com/CMEPW/BypassAV  #Pentesting #bypass  #CyberSecurity #Infosec
Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Netsh.exe relies on extensions taken from Registry, which means it may be used as a persistence. And what, if you go one step further, extending netsh with a DLL allowing you to do whatever you want? Kinda #LOLBin 😎 Enjoy the C code and DLL, as usual: github.com/gtworek/PSBits…

bohops (@bohops) 's Twitter Profile Photo

Here are a few recent additions to the Microsoft Block Rules 👀 - webclnt.dll - davsvc.dll - HVCIScan.exe And it is nice to see Will Dormann is on Mastodon on the acknowledgements list - congrats! learn.microsoft.com/en-us/windows/…