Authentication is proving you are who you claim to be (“I am Hal”). Authorization is granting privileges to an authenticated entity (“Hal can run commands via sudo”).
The Unix command "grep" gets it's name from the "ed" command-line editor which had a command for displaying matched patterns: "g" (for "global"), followed by a regular expression ("re"), followed by "p" (for "print").
A reminder to survivors of every type—wear your scars proudly. Though it may not feel like it, today is a victory. You are still here despite everything you have endured. youtube.com/watch?v=mg3hYE…
This is a GREAT blog post on #cobaltstrike analysis from late last month - if you're not familiar with analyzing Cobalt Strike, I highly recommend you read it. H/T to @4A4133 for flagging this!
randhome.io/blog/2020/12/20/…
Booking speakers for Life Has No Ctrl+Alt+Del. Let me know if you are interested. Zoom meeting, 30 mins total with some of the best people I know in DFIR.
Oh yea, I tried to make this a thing but had too small reach at BSides. (Sticking a specific sticker on the con badge if you’re willing to do social or networking stuff that doesn’t involve or pressure alcohol use.)
I wrote a @littlesnitch log exporter for the new version 5 that transforms CSV into log lines and creates summaries of all connections within a given timeframe
- also check the --noteworthy flag to reduces even that summary
github.com/Neo23x0/littlesni…