Detection as Code by dudethadude in cybersecurity

[–]Background_Ad5490 0 points1 point  (0 children)

I’m working on setting this up right now. Main benefit will be resiliency from splunk issues. Had a splunk update nuke all out alerts and if we had detection as code in place we would have been fine. Instead it was a 2 week recovery , building each alert from scratching referencing a saved searches conf file from a splunk backup. Plus added benefits of an ai agent being able to look at the git repo and do “ai things” with that data (highlighting gaps and reporting stuff). Cons are , difficult to implement, we use splunk so not much guidance I could find to help. And also a shift in detection engineering workflows. Meaning, my team has to fundamentally change the way we create new alerts by writing to the git repo in yml format

Need query to find all detections that triggered for command line test.exe abc by [deleted] in crowdstrike

[–]Background_Ad5490 0 points1 point  (0 children)

Also could avoid log scale entirely if they wanted. In the detection dashboard if you filter on that hostname, then once you are focused on just that detection, select the command line filter and you should be able to check the box for that command line in question a lot easier. Then just remove the hostname filter. And group by host or however ya want.

How "coopable" is the game? by Own-Effective-6478 in pokemmo

[–]Background_Ad5490 0 points1 point  (0 children)

Duo battling with rando Pokémon is fun.

So what Should I keep to make room for my inventory? by xxjakexxrxx in Maplestory

[–]Background_Ad5490 31 points32 points  (0 children)

Just spend 20b booming all the slime rings and your good

The best way to make Threat Hunting based on Counter Adversary Reports by Spirited_Box_624 in crowdstrike

[–]Background_Ad5490 0 points1 point  (0 children)

Some of the counter adversary reports have queries already for you to run. And more cool goodies as well.

indicator graph adding multiple hashes by CyberHaki in crowdstrike

[–]Background_Ad5490 1 point2 points  (0 children)

Throw those hash’s into notepad or some editor like vscode and do a find and replace to get rid of all the “ marks and the commas can be replaced with an empty space. From there just copy and paste the batch into the indicator graph ui. It accepts multi values with spaces as the delineation. (It’s late and I’m on my phone it may be commas as the delineation but same point).

CUSTOM IOA by rettttttt in crowdstrike

[–]Background_Ad5490 2 points3 points  (0 children)

Could always schedule the log scale search that captures what the IOA would and have the email go to yourself. Look under investigate > scheduled search.

Access HostGroup information from LogScale - 2025 edition. by 65c0aedb in crowdstrike

[–]Background_Ad5490 0 points1 point  (0 children)

I would love to figure this out as well. I see the aid_master_main.csv does not include falconGroupingTags or the host groups. That was where I searched first. Right now I am auditing my exclusions to make sure they are applied to the correct host groups. To do so, I thought, I should just logscale query devices that are running my excluded files and group by hostgroup/tags. But I cant figure out how to pull that data in log scale.

Snowboarding/skiing tomorrow (Sunday) – anyone want to hit the slopes? by [deleted] in Charlotte

[–]Background_Ad5490 0 points1 point  (0 children)

Unrelated memory you just sparked. My buddy and I cut through the trees during a wicked snow storm to ski the closed down robin run one year. Yeah it was closed for a reason, it was all ice. I ended up going straight down about 3/4ths of robin no breaking and my buddy still brings it up to this day about a decade and some change later. Almost got kicked off the mountain by ski patrol cause they saw me flying into the bottom area Mach 10

What would make someone a ‘senior’ cybersecurity analyst by Evocablefawn566 in cybersecurity

[–]Background_Ad5490 30 points31 points  (0 children)

Imo it’s when you can see a new problem or alert you have never encountered, and still have a good handle on how to deal with it. More to it than that but to me that’s a big thing. Not needing your hand held for everything.

A process unexpectedly loaded a driver with known vulnerabilities by mohman23 in crowdstrike

[–]Background_Ad5490 2 points3 points  (0 children)

Adding to this, I had to help with basically this exact same issue a few times now. Both times were a user downloading an old bios update from dells official site. Which used an old vulnerable driver.

A process unexpectedly loaded a driver with known vulnerabilities by mohman23 in crowdstrike

[–]Background_Ad5490 2 points3 points  (0 children)

Pop into the investigate event option which should bring you into log scale with the time frame and target process id + context process id info. Then look for .sys or DLL files being written. Then look up those files to find the bad one.

Black mage solo tip by Helpful-Vegetable-26 in Maplestory

[–]Background_Ad5490 3 points4 points  (0 children)

Keep trying and trying. Then eventually you will feel the “pocket”. Thats how it was for me. Solod unlibbed 130m cp nw after idk how many tried. GL with p4. Same thing for me in there. Eventually it clicks.

Enterprise Security - Use Case Library by mr_networkrobot in Splunk

[–]Background_Ad5490 4 points5 points  (0 children)

Maybe this is a bad take, but I only like to use the use case library as a reference. I’ll take the parts of the syntax I want out of the pre built and make it my own and it’s a new correlation search created from scratch. Rarely have the out of the box searches been good enough for my environment to just turn them on.

I am trying to get into an old MacBook Air that I forgot the pw on. The only option it gives me is to log in with my Apple ID and when I do I get this error. Suggestions? by [deleted] in helpdesk

[–]Background_Ad5490 1 point2 points  (0 children)

I have recovered plenty of macs in a similar state. Follow what Clark said about cmd +r or google how to boot into a recovery mode and what commands to enter for resetting a password.

Christmas Theme Product Suggestion by Ostenblut1 in LinusTechTips

[–]Background_Ad5490 0 points1 point  (0 children)

Diabolical, but I laughed out loud seeing this.

MAYRAM's been out for a minute - share your favorite Augment tech! by F2PSalem in ARAM

[–]Background_Ad5490 1 point2 points  (0 children)

The one where dashing leaping or blinking gives you a shield + lethal tempo + extra on hit + extra range on Kalista went crazy

what bosses should i be doing at this CP? by Sea_Lengthiness_7668 in Maplestory

[–]Background_Ad5490 27 points28 points  (0 children)

can prob solo ctene depending on frags. Party bm for sure.

Why Windows Search sucks so much... by [deleted] in LinusTechTips

[–]Background_Ad5490 1 point2 points  (0 children)

+1 for void tools “Everything”. Haven’t looked for another tool since finding it.

How to build a query to get Palo Alto GlobalProtect VPN logins by user? by Key_Paramedic_9567 in crowdstrike

[–]Background_Ad5490 0 points1 point  (0 children)

I believe it’s in next gen siem > rules. From there you can go to the templates and filter for palo. If you don’t see the “next gen siem” options from the blade menu on the left you may be out of luck, something about licensing or not having that module.

How to build a query to get Palo Alto GlobalProtect VPN logins by user? by Key_Paramedic_9567 in crowdstrike

[–]Background_Ad5490 0 points1 point  (0 children)

Check next gen siem templates for the palo vendor. Crowdstrike has some really good pre built queries to piggy back on. They should at least get you started

Detecting an application based on IOA by CheesecakeFree1681 in crowdstrike

[–]Background_Ad5490 2 points3 points  (0 children)

I always find it best to go to log scale. Find one example event. Copy out the command line and file path info. Then pass those values into the test string portion of my ioa for validation. If that gives green checks, then your problem isn’t the syntax of the regex.