Wayne (@kprobes) 's Twitter Profile
Wayne

@kprobes

Threat Intelligence - Detection Engineering

ID: 322589994

calendar_today23-06-2011 12:32:40

390 Tweet

165 Takipçi

421 Takip Edilen

WithSecure Labs (@fsecurelabs) 's Twitter Profile Photo

We just released our analysis of new technical details related to Lazarus targeting the cryptocurrency vertical (Macros not needed): labs.f-secure.com/publications/t…

Luke Roberts (@rookuu_) 's Twitter Profile Photo

I've released a new post on F-Secure Labs that considers persistence using calendar alerts on macOS. This builds on some awesome prior work by Andy Grant, and can now be executed using Cody Thomas 's Mythic framework.

WithSecure Labs (@fsecurelabs) 's Twitter Profile Photo

Oh, you liked them Lazarus Detection Rules? See what happens when Incident Response and Threat Hunting really get along & make it to second base: labs.f-secure.com/blog/catching-…

William Burgess (@joehowwolf) 's Twitter Profile Photo

My talk on detecting access token manipulation from last years Black Hat is now up. If you have ever been confused by the bigger picture of how access tokens/logon sessions/network auth all fit together you may find it a useful resource youtu.be/RMVyYvt0bLY

WithSecure Labs (@fsecurelabs) 's Twitter Profile Photo

How do we spot the rotten Apples? Join Calum and Luke as they take us through the basics of macOS detection labs.f-secure.com/blog/attack-de… labs.f-secure.com/blog/attack-de… labs.f-secure.com/blog/attack-de…

RandomAccessMusings (@rndmaccssmsngs) 's Twitter Profile Photo

labs.f-secure.com/blog/prelude-t… Write up of some analysis we did off the back of an incident a few months ago. Mapped to ATT&CK and with sigma rules for actionable takeaways

James D (@frantictyping) 's Twitter Profile Photo

I'm excited to release a tool that I wrote at F-Secure Countercept to help triage Windows event logs. Chainsaw is a RUST CLI tool to quickly search and hunt through event logs. It supports sigma detection rules to identify potential threats. More info here: github.com/countercept/ch…

I'm excited to release a tool that I wrote at <a href="/countercept/">F-Secure Countercept</a> to help triage Windows event logs.

Chainsaw is a RUST CLI tool to quickly search and hunt through event logs. It supports <a href="/sigma_hq/">sigma</a> detection rules to identify potential threats.

More info here: github.com/countercept/ch…
F-Secure Consulting (@fsecure_consult) 's Twitter Profile Photo

Join @Lavi161 at AISA National as he discusses #UEFI variable runtime manipulation persistence techniques, and detection and monitoring methods. This is going to be a good one. Register to book your seat now >> cyberconference.com.au/program-virtua…

Join @Lavi161 at <a href="/AISA_National/">AISA National</a> as he discusses #UEFI variable runtime manipulation persistence techniques, and detection and monitoring methods. This is going to be a good one. Register to book your seat now &gt;&gt; cyberconference.com.au/program-virtua…
Paul Seekamp (@nullenc0de) 's Twitter Profile Photo

I just used github.com/countercept/ch… for a real IR. 😲 unbelievable! The best IR tool in my tool belt, bar none. Customer gave me 50 gigs of EVNT logs and I had answers in minutes. MINUTES!

RandomAccessMusings (@rndmaccssmsngs) 's Twitter Profile Photo

Awesome research on macOS #ESF and some practical examples for threat detection by my colleague Connor labs.f-secure.com/blog/esfang-ex…

William Burgess (@joehowwolf) 's Twitter Profile Photo

Ever wanted to make your sketchy sys calls look squeaky clean? I wrote a blog demonstrating a PoC which calls NtOpenProcess to grab a handle to lsass with an arbitrary/spoofed call stack: labs.withsecure.com/blog/spoofing-… PoC: github.com/countercept/Ca…

James D (@frantictyping) 's Twitter Profile Photo

I'm happy to announce the release of Chainsaw v2! 🥳 Chainsaw allows users to rapidly search through Windows event logs and hunt for threats using sigma detection rules, all without a SIEM! Version 2 includes some exciting new features, info in 🧵 github.com/WithSecureLabs…

William Burgess (@joehowwolf) 's Twitter Profile Photo

I wrote a PoC memory scanner for detecting timer-queue timers ala 5pider 's Ekko sleep obfuscation. Blog here: labs.withsecure.com/publications/h… PoC: github.com/WithSecureLabs…

Luke Jennings (@jukelennings) 's Twitter Profile Photo

My #BlueHat talk "The new SaaS cyber kill chain" has finally dropped! If you didn't make it to Seattle last month, check it out on youtube along with all the talks. Microsoft BlueHat thanks again for having me! youtu.be/pdDzUTFVIZc?si…

William Burgess (@joehowwolf) 's Twitter Profile Photo

New CS blog: Introducing the Mutator Kit - Creating Object File Monstrosities with Sleep Mask and LLVM cobaltstrike.com/blog/introduci…

William Burgess (@joehowwolf) 's Twitter Profile Photo

New CS Blog - Revisiting the UDRL Part 3: cobaltstrike.com/blog/revisitin… If you like the idea of loading a custom c2 channel in your UDRL then this blog may be of interest 👀