I am retiring this social media account. Find me as @hal_pomeranz@infosec.exchange

Orlando, FL
Joined November 2008
They’re just waiting for him to be big enough to be worth eating
1
Yes, you’re grappling with the “demonstrating a negative” problem. The spending did likely prevent multiple incidents that never rose to the level of visibility.
3
24
Thanks everybody for your concern. We are prepared for Ian and will be fine. If you are stuck in central Florida and need help, please reach out. DMs are open.
2
1
19
Daily Linux Forensics Trivia #23 - You find these commands in /root/.bash_history: "dd if=/dev/urandom of=/junk bs=1M; rm -rf /junk". What did these commands accomplish?
7
3
1
9
Trivia Answer #22 -- The quick summary is that the entry for the deleted file becomes "slack space" at the end of the previous directory entry. The inode number and file name from the deleted file entry are still visible. More details at sans.org/blog/understanding-…
1
I’d go further. I challenge orgs to stop supporting and turn off one tool per year where they could easily get similar coverage from other existing tools in their environment.
9
Daily Linux Forensics Trivia #22 - Explain what happens in an EXT directory file when you delete a file from that directory.
1
1
Trivia Answer #21 - Shout out to @lux_amalgamated for chiming in on this one. Assuming you have your evidence mounted on /mnt/evidence, the easiest thing to do is "find /mnt/evidence -newer /mnt/evidence/tmp/evil". This will show all files with a later mtime than /tmp/evil.
1
2
Important thread here. Everybody fails. The people who I look up to are honest about their failures, figure out why things failed, and come back better.
Got several DMs about this. Folks, I fail in tech all the time. SPOILER: EVERYONE DOES. The reason you don't hear about the issues is everyone wants to put their best foot forward. If you think somehow folks "level up" and don't have these issues, please think again. 1
1
5
Hal Pomeranz retweeted
Big web app pen test this week. Went to bed with a huge case of imposter syndrome. "Maybe I should open a coffee shop?" This morning I got server-side code execution, found VPN keys, and pivoted to internal network.😬 Don't let your struggles define what you can accomplish.
3
8
68
GIF
It’s also the key to Perl programming
1
4
Hal Pomeranz retweeted
A reminder, it’s all fun and games until the #WaffleHouse Index hits red.
WAFFLE HOUSE INDEX: As Tropical Storm Ian threatens to make landfall in Florida as a major Category 3 hurricane, there is one indicator that could tell us how bad the storm impacts Florida: the Waffle House. fox35orlando.com/news/waffle…
3
6
1
29
Orlando is my home base. If your travel plans get messed up by the weather and you get stuck in the City Beautiful, reach out and we will help. DMs are open.
1
8
Got my flu shot. Please think about getting yours. Much love!
4
Hal Pomeranz retweeted
Changing jobs is scary, trusting people is scary, making big decisions that involve finances is scary. Meeting new people is scary. I see this in people of all genders and ages.
8
6
2
237
You can spend 2 hours staring at your screen, wondering why your code won’t work. Or you can go for a 20 minute walk and probably figure it out right after.
28
113
18
898
Hal Pomeranz retweeted
Is it "be very afraid that instead of penny candy, people will give your trick or treaters expensive street drugs that your children will obviously not confuse for individually wrapped candy" season yet?
11
7
2
135
Daily Linux Forensics Trivia #21 - You find the attacker's privilege escalation exploit installed as /tmp/evil. You want to find all files on the system that were modified since the privileged escalation exploit was dropped. How would you do this in Linux?
6
4
Trivia Answer #20 - Shout out to @countuponsec for a great list-- linux_check_modules and linux_hidden_modules to look for modules that are hiding, linux_check_syscall to look for kernel hooks, and linux_check_inline_kernel to look for patching
3
/dev/kmem + GDB Stub = kmemd This is an introduction to kmemd - a tool for exploring a live Linux kernel’s memory in a non-intrusive way using GDB. wkz.github.io/post/kmemd/ Explore a live Linux kernel's memory using GDB github.com/wkz/kmemd
4
78
213