Andre Pawlowski (@sqall01) 's Twitter Profile
Andre Pawlowski

@sqall01

IT-security enthusiast. Maker. Member of @FluxFingers. Author of alertr.de

ID: 108678255

linkhttps://pawlowski.dev calendar_today26-01-2010 18:24:37

1,1K Tweet

666 Followers

70 Following

Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

Here is a quick way to find tainted Linux kernel modules that are not maliciously hiding: cat /proc/modules | grep \(.*\) Sample "malicious_module" is both out-of-tree and unsigned which would warrant a closer look.

Here is a quick way to find tainted Linux kernel modules that are not maliciously hiding:

cat /proc/modules | grep \(.*\)

Sample "malicious_module" is both out-of-tree and unsigned which would warrant a closer look.
Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

This is an almost identical technique used by BPFDoor malware from last year. They used iptables on Linux to re-route traffic when a magic packet was seen. This will allow C2 to the malware through firewalls allowing legitimate inbound traffic to the server.

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

The best way to learn how real threat actors operate is to read the many published threat reports on their activity DFIR Report thedfirreport.com APT Groups and Operations docs.google.com/spreadsheets/d… ORKL orkl.eu/sources I’ll add more links in the replies 🧵

Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

If you run an open source project and need to protect your infrastructure, Sandfly Security will give you a free full license. Reach out at our website or here with a DM and we'll get you sorted. We do this for other projects and want to protect the integrity of your hard work.

Jose Enrique Hernandez (@_josehelps) 's Twitter Profile Photo

Hey, infosec brains trust! 🧠 Ever felt like you're juggling digital chainsaws? 🪚💻 I've been in the trenches with: 🔹#LOLBAS 🛠️: Your multi-tool for Windows. A treasure trove of Binaries, Scripts, and Libraries that adversaries may use to live off your land. 🔹#GTFOBINS ⚙️:

Hey, infosec brains trust! 🧠 Ever felt like you're juggling digital chainsaws? 🪚💻 I've been in the trenches with:

🔹#LOLBAS 🛠️: Your multi-tool for Windows. A treasure trove of Binaries, Scripts, and Libraries that adversaries may use to live off your land.

🔹#GTFOBINS ⚙️:
Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

Here's how to use simple Linux command line tools to investigate and de-cloak Reptile stealth rootkit and others like it. grep . /etc/modules dd count=10000 bs=1 if=/etc/modules 2>/dev/null cat /etc/modules | wc -c

Here's how to use simple Linux command line tools to investigate and de-cloak Reptile stealth rootkit and others like it.

grep . /etc/modules
dd count=10000 bs=1 if=/etc/modules 2>/dev/null
cat /etc/modules | wc -c
Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

Finally, check that the kernel and filesystem byte counts match. Feeding the file through a simple "wc -c" command will count the bytes the filesystem thinks is present. If these values don't match, something is hiding. cat /etc/modules | wc -c

Finally, check that the kernel and filesystem byte counts match. Feeding the file through a simple "wc -c" command will count the bytes the filesystem thinks is present. If these values don't match, something is hiding. 

cat /etc/modules | wc -c
Giuseppe `N3mes1s` (@gn3mes1s) 's Twitter Profile Photo

Pitfalls of relying on eBPF for security monitoring (and some solutions) from ⁦Trail of Bits⁩ Very nice overview and production problem you could encountered creating a security solution based on ebpf. And even some bypass 😁 blog.trailofbits.com/2023/09/25/pit…

Eric Leblond (@regiteric) 's Twitter Profile Photo

Kunai is an open source sysmon "clone" developed in rust and based on eBPF (cc Alexei Starovoitov) that has just been presented at #hacklu github.com/0xrawsec/kunai

Kunai is an open source sysmon "clone" developed in rust and based on eBPF (cc <a href="/alexei_ast/">Alexei Starovoitov</a>) that has just been presented at #hacklu github.com/0xrawsec/kunai
Andre Pawlowski (@sqall01) 's Twitter Profile Photo

What are linux process environment variables you should take a closer look into if you find them for processes on your system? I currently have in mind: - HISTFILE (=/dev/null) - HISTSIZE/HISTFILESIZE (=0) - LD_PRELOAD - SOCAT_* - SSH_C* (if ppid=1 => left-over process)

Andre Pawlowski (@sqall01) 's Twitter Profile Photo

TIL: if you are searching for suspicious processes on a Linux host by looking if the /proc/<pid>/exe points to a deleted file, it can point to "/ (deleted)". Apperently the Linux kernel also spawns processes: uninformativ.de/blog/postings/…

Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

Mission Impossible: Elite xz SSH backdoor used to access your network. Mission Reality: Your org still has default accounts with easily guessed passwords all over.