Thank you for the kind words. That content is still very relevant. The major change since then has been the arrival of Sysmon to add more detailed information to your log stream.
NOW ACCEPTING APPLICATIONS | Deadline 7/15
Ken Johnson Scholarship at the #DFIRSummit will provide:
- Two SANS #DFIR classes
- Mentoring from @_bromiley & @DAVNADS
- Consideration for an internship
- One DFIR Summit seat
Learn more & apply here👉sans.org/u/1kYm
Want a quick & dirty (but supported by Microsot) way to avoid #follina Office know payloads?
Just disable "Troubleshooting wizards" by GPO
> admx.help/?Category=Windows_…
HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnostics - EnableDiagnostics - 0
By CERT @banquedefrance
In 1990 I was doing network operations for a NASA project aiming for terascale computing. Nice to see exascale computing arriving right on time according to Moore’s Law.
This only works because of the handler in HKCR\ms-msdt. If you delete this key, users will see the following if they open a payload document. Note that I haven't tested this to know other impacts but it absolutely prevents exploitation with known #msdt samples. 8/
Dear infosec: Sorry to barge in on your Memorial Day weekend, but if you're not following the msdt 0-day in MS Office you probably should be.
I've validated it's working on my test systems and is trivial to exploit. First report here:
Interesting maldoc was submitted from Belarus. It uses Word's external link to load the HTML and then uses the "ms-msdt" scheme to execute PowerShell code.
virustotal.com/gui/file/4a24…
Right there with you, brother. I became a step-parent at age 45 and have been trying to measure up since then. Sometimes all you can do is try to be better tomorrow.
HOW DID I MISS THIS?
The way most folks tell me to look for timestomps isn't just wrong it's dead wrong and easy to see why. (0'ed out milliseconds is only done by SOME tools running w/ defaults)
Here's an *awesome* post that shows better methods of timestomp indicators!
1\ How to detect file timestomping 👀
APT28, APT29, APT32, APT38 have all used this defence evasion technique to modify malicious file creation times. 😈
Did you also know it's possible to timestomp $FN time?
👇👇 BLOG & TL;DR BELOW 👇👇
bit.ly/3KsX1ua
1\ #DFIR: How to detect malicious clipboard use?
TAs abuse clipboards to steal data / paste commands.
Three artefacts you can analyse:
> ActivitiesCache.db
> Memory forensics
> Clipboard history folder
I break down how to do this in my blog👇
inversecos.com/2022/05/how-t…
This is so true. You may even come up with a better way to do things.
Also don't let others keep you from trying. I've seen some people try to keep others from discovering new solutions. Ignore them and keep trying.
florida high school class president zander moricz was told by his school that they would cut his microphone if he said “gay” in his grad speech, so he replaced gay with “having curly hair.” i am in awe
How exactly is the one time code you are sending me via SMS a security control if you ask me to give you the number to send it to and don’t do any verification that the number belongs to me?
Super-awkward was when a relative of mine called me in a panic about a similar email. It apparently described their behavior accurately enough that they were worried about being outed. These were things I really didn't need to know about that person.