MENASecurity (@menasec1) 's Twitter Profile
MENASecurity

@menasec1

Applied Security Research | Threat Hunting | DFIR | [email protected] 👁‍🗨

ID: 1102255788251324417

linkhttps://blog.menasec.net calendar_today03-03-2019 17:13:53

81 Tweet

2,2K Takipçi

40 Takip Edilen

MENASecurity (@menasec1) 's Twitter Profile Photo

Ifu see 4738 OR 4742 with ALL Changed Attribs equal to "-" (almost 0 in normal behavior), then its strong evidence of DACL based attacks (manipulating ACEs and AD specific Objects's Rights) Powerview\Add-DomainObjectAcl| Set-DomainObject|Set-DomainObjectOwner #threathunting #dfir

Ifu see 4738 OR 4742 with ALL Changed Attribs equal to "-" (almost 0 in normal behavior), then its strong evidence of DACL based attacks (manipulating ACEs and AD specific Objects's Rights) Powerview\Add-DomainObjectAcl| Set-DomainObject|Set-DomainObjectOwner #threathunting #dfir
MENASecurity (@menasec1) 's Twitter Profile Photo

QRadar SIEM Sysmon App comes by default with almost 80 use cases, for those planning to adopt it, here you can find the needed events mapped to use cases' description 👉goo.gl/hWRCih #threathunting #SIEM #Sysmon #Qradar #DFIR

QRadar SIEM Sysmon App comes by default with almost 80 use cases, for those planning to adopt it, here  you can find the needed events mapped to use cases' description 👉goo.gl/hWRCih #threathunting #SIEM #Sysmon #Qradar #DFIR
MENASecurity (@menasec1) 's Twitter Profile Photo

[Credential Access] - short write-up explaining one way to detect malicious programs dumping browser's saved credentials or permanent cookies 👉 blog.menasec.net/2019/04/creden… … #ThreatHunting #DFIR

[Credential Access] - short write-up explaining one way to detect malicious programs dumping browser's saved credentials or permanent cookies 👉 blog.menasec.net/2019/04/creden… … #ThreatHunting #DFIR
MENASecurity (@menasec1) 's Twitter Profile Photo

[Credential Access] - KeePass.exe credential dumping using KeeFarce.exe can be detected using the following SIGMA rule #ThreatHunting #DFIR #SIGMA

[Credential Access] - KeePass.exe credential dumping using KeeFarce.exe can be detected using the following SIGMA rule #ThreatHunting #DFIR #SIGMA
MENASecurity (@menasec1) 's Twitter Profile Photo

The negative impact of Network Level Authentication on Windows Failed RDP Logon Events -> blog.menasec.net/2019/04/the-im… #DFIR #threathunting

The negative impact of Network Level Authentication on Windows Failed RDP Logon Events ->  blog.menasec.net/2019/04/the-im… #DFIR #threathunting
MENASecurity (@menasec1) 's Twitter Profile Photo

A starting point to hunt for suspicious usage of Remote Support Tools blog.menasec.net/2019/11/huntin… #threathunting #dfir

A starting point to hunt for suspicious usage of Remote Support Tools blog.menasec.net/2019/11/huntin… #threathunting #dfir
MENASecurity (@menasec1) 's Twitter Profile Photo

Hunting for T1078.003 - Local Accounts and Groups Changes using Sysmon blog.menasec.net/2020/09/huntin… #ThreatHunting

MENASecurity (@menasec1) 's Twitter Profile Photo

good understanding of the offensive technique, filtering out normal behavior while in the same time balancing detection resilience, alert context and performance impact are key concepts for detection engineering. blog.menasec.net/2020/11/how-to…

Ring3API 🇺🇦 (@ntlmrelay) 's Twitter Profile Photo

📌How to Design Abnormal Child Processes Rules without Telemetry by MENASecurity [BLOG]➡️ blog.menasec.net/2021/01/how-to… #ThreatHunting #BlueTeam #security #DFIR

📌How to Design Abnormal Child Processes Rules without Telemetry by <a href="/menasec1/">MENASecurity</a> 
[BLOG]➡️ blog.menasec.net/2021/01/how-to…

#ThreatHunting #BlueTeam #security #DFIR
MENASecurity (@menasec1) 's Twitter Profile Photo

Hunting for Suspicious Usage of Background Intelligent Transfer Service (BITS) blog.menasec.net/2021/05/huntin… #ThreatHunting

RawSec (@0xrawsec) 's Twitter Profile Photo

Integrating process protection level information into all #EDR #Sysmon events. As suggested by MENASecurity in blog.menasec.net/2022/04/auditi… using Win API instead of checking RunAsPPL registry key (which seem to apply only to lsass) #dfir #threathunting github.com/0xrawsec/whids

RawSec (@0xrawsec) 's Twitter Profile Photo

Just pushed the code to embed process protection level in severa events of our #opensource #EDR #dfir #threathunting github.com/0xrawsec/whids thanks to MENASecurity for the idea

Just pushed the code to embed   process protection level in severa events of our #opensource #EDR
#dfir #threathunting
github.com/0xrawsec/whids
thanks to <a href="/menasec1/">MENASecurity</a> for the idea