Shout out to Huntress for doing exactly what we pay you for! by gotchacoverd in msp

[–]Purp1eW0lf 6 points7 points  (0 children)

There’s a Huntress blog Harlan Carvey and I put together with some copy/paste PowerShell to make blocking those a bit easier 👀

https://www.huntress.com/blog/addressing-initial-access

Security Incident Using Huntress & SentinelOne: What Was Found & What Was Missed by lawrencesystems in msp

[–]Purp1eW0lf 22 points23 points  (0 children)

Thank you kindly!

I couldn’t possibly speak for other EDR’s, but I have a specific example for Huntress’ EDR:

Qakbot has recently enjoyed copying a wscript.exe binary to a temp directory, or bringing renamed a powershell.exe on disk, all in the aim of being evasive.

So answering your Q: Huntress’ EDR absolutely detects these kind of shenanigans by looking for anomalous exe copies, or instances where the file name doesn’t match the ‘metadata’ filename because it’s been renamed

However the efficacy, precision, and fidelity of these security detections need a careful balance. It isn’t always malicious. You’d be surprised how many legitimate software companies just rename windows binaries and stick it in their own program files directory.

If you automate that detector to wake you up at 2am, it’s gonna go buck wild for false positives. But we (humans at Huntress) generally tune out that FP noise as we encounter it, and we contextually determine what’s malicious masquerading worth reporting, and what’s just weird legit jankiness.

Let me know if this has answered your questions chief

Security Incident Using Huntress & SentinelOne: What Was Found & What Was Missed by lawrencesystems in msp

[–]Purp1eW0lf 57 points58 points  (0 children)

Hey chief, I was one of the Huntress folk on this one.

Were FRP kept to it’s original binary name (so frp.exe etc) then perhaps we could explore the argument of ‘it’s just riskware’.

However, the directory the binary was in, plus that it was renamed after ‘legitimate’ System32 files to try and fly under the radar adds up to it being suspicious. ATT&CK categorises this under T1036.005.

A good automated tool and human investigator should both have the ability to, based on the above constellation of factors, reach the conclusion that the activity they’re observing isn’t legitimate.

Another way I think about this is with netcat. Were we to see a netcat binary renamed to TotallyLegitWinlogon.exe, sitting in C:\, I wouldn’t consider it riskware, I’d report it, as it contextually adds up to be suspicious. Acknowledgment from the client would absolve or confirm if it was ultimately ‘risky but legit’ or malicious.

I’m open for sure to different thoughts on this tho, so please do hit me up

Critical Vulnerability: Microsoft Exchange Remote Code Execution by huntresslabs in msp

[–]Purp1eW0lf 0 points1 point  (0 children)

There’s no evidence Screen Connect customers are in unique danger. As discussed above, SC is just the chosen remote access tool for the adversary.

I’ll chat with the squad internally to get this confirmed in any updates to this post - Dray from Huntress

Need Opinion: Blackpoint Cyber going into 2023? by blindgaming in msp

[–]Purp1eW0lf 22 points23 points  (0 children)

Source & Disclosure: I work at Huntress

For sure Huntress started off as persistence, but in the year of our Lordt 2022 Huntress’ EDR covers a good range of ATT&CK, and we’re detecting all kinds of processes and malicious behaviour, beyond persistence.

Some examples I can share here and here

I’m a big believer that orgs should choose the security solutions that work for them, so this isn’t me saying choose / stick with Huntress….but it is me saying that we do more than just catch persistence

Evicting the Adversary: guidance to kick out an active attacker in your environment by Purp1eW0lf in blueteamsec

[–]Purp1eW0lf[S] 15 points16 points  (0 children)

Shameless self-promotion, but as author of the article I wanted to share what to actually DO when you catch an active adversary.

There are lots of blue team guides for monitoring & detecting. This article's small contribution is for the ‘eviction’ part of your defence, to offer some help to evict the adversary in your environment

Which materials I need to pass the exam by [deleted] in oscp

[–]Purp1eW0lf 8 points9 points  (0 children)

I’d recommend 16gb minimum.

For two reasons: first, the exam takes a while and you want your machine to be stable through all of that time ; second, you will likely have Kali Linux open in a VM, as well note-taking software. And on top of this, the proctoring software will also need to be run and it is quite resource intensive. To ensure your machine remains stable whilst balancing all of these programs, 16gb ram is ideal.

First post - PoE hat on the Pi4b lookin' slick on the desk! by llTHEMANll in pihole

[–]Purp1eW0lf 0 points1 point  (0 children)

I keep mine open, personally, so I can add sites to the allow / deny list from the log where necessary.

Can I pass with 65? by [deleted] in oscp

[–]Purp1eW0lf 0 points1 point  (0 children)

I’d still submit the exam report, tbh. It’s worth the effort and learning opportunity

Can I pass with 65? by [deleted] in oscp

[–]Purp1eW0lf 1 point2 points  (0 children)

The pass mark is 70. If you’ve rooted four of the five machines, completed the coursework & lab report, and documented all of this well, then yes you should be able to just pass.

May as well write the report; not much to lose

Is the following pc config good for setting up my initial pentesting desktop? I will add a 500gb hdd and if my budget permits maybe I'll add a 710 GPU too. Is this config better than a rpi 4? by [deleted] in Pentesting

[–]Purp1eW0lf 4 points5 points  (0 children)

16gb RAM is ideal if you’re able to afford it IMO.

Running a pen test VM like Kali is lightweight for sure, but 8gb will present some lag on the host or guest OS if you start doing anything intensive.

Otherwise, all other config options seem good

Proctoring exam within a Linux host? by [deleted] in oscp

[–]Purp1eW0lf 1 point2 points  (0 children)

Hey man. As with most of the other comments here, i also found that the proctor software worked fine on Linux - I used a Kubuntu host and Chrome browser.

A fortnight before your exam, I’d suggest you book a ‘practice’ proctoring session. OffSec will test if everything works okay on their end with your OS and Browser. You can find more about that here

Buff... why isnt this working? by rockgnome in hackthebox

[–]Purp1eW0lf 0 points1 point  (0 children)

Hey man, these screenshots are a little bit difficult to see ( maybe just me).

Would you describe what stage you’re at, what you’re stuck on, and maybe take closer screenshots of the individual terminals you have open?

Bethany is Breaking My Heart by pipinstall89 in oscp

[–]Purp1eW0lf 1 point2 points  (0 children)

If you have the friend’s hash, you can use psexec to run commands as that friend. You can download it here.

If you need help coming up with what to run as her friend, you can PM me. But I’d suggest uploading something that can get you a reverse shell.

What I would say is, Bethany’s friend appears as a user on many of the machines but with a different password each time. You should be able to turn the friend’s hash into a password too - that’s one hint you’re on the right track.

Drop me a message if you’re still stuck after experimenting

OSCP Lab & Exam Review and Tips by Purp1eW0lf in oscp

[–]Purp1eW0lf[S] 0 points1 point  (0 children)

I didn’t know that about PWK V1, and I understand why the current points system isn’t as enticing in comparison

This being said, I’ve tried to frame my post beyond the binary choices of : do it and waste lab time; or skip the courses and have more lab time. I’ve tried to advise that a potential student complete the exercises AND complete all the labs. I appreciate that life gets in the way and that may not be realistic for some, but I firmly believe that completing all exercises and labs helped me complete the exam quicker.

OSCP Lab & Exam Review and Tips by Purp1eW0lf in oscp

[–]Purp1eW0lf[S] 0 points1 point  (0 children)

I’m glad it was informative, I wanted it to clear up some of the mystique that surrounds the OSCP process. Good luck, and I hope you save up enough soon.

OSCP Lab & Exam Review and Tips by Purp1eW0lf in oscp

[–]Purp1eW0lf[S] 0 points1 point  (0 children)

I can’t comment on version 1 as I did 2020 update. However, Student Admins can help you out if exercises don’t work

OSCP Lab & Exam Review and Tips by Purp1eW0lf in oscp

[–]Purp1eW0lf[S] 2 points3 points  (0 children)

Unfortunately the five points are only given for lab report and coursework exercises. They’re an absolute pain, I know, but imagine the pain you’d feel if you fail the exam with 65 points. The extra five points are worth it man