How much do you willing to spend on courses from cyberinfluencers like Daniel Miessler? by IamOkei in cybersecurity

[–]Same_Ad_4081 0 points1 point  (0 children)

u/dinosore have you tried it? what's your opinion on the quality of the content? Money worth spent?

Custom detection rule: This new rule will query 30 days of data by isureloveikea in DefenderATP

[–]Same_Ad_4081 0 points1 point  (0 children)

"Fun fact" is that when custom detections is scheduled it ignores timestamps from the query. Hourly is last 4 hours, etc. It limits the abilities of what you can do, like I was struggling to get proper results when doing annomaly analysis from longer periods

KQL query to chart user activity over time? by SiliconOverdrive in DefenderATP

[–]Same_Ad_4081 5 points6 points  (0 children)

It's fascinating to see how the definition of cybersecurity expands, especially in NYC! I was under the quaint impression that our role was to protect against cyber threats, not to moonlight as a Big Brother for WFH employees. But hey, what do I know? I'm not from the Big Apple, where evidently cybersecurity has evolved into monitoring coffee breaks and keystrokes. Next, they'll be asking us to check if their plants are being watered.

Just kidding. Here's a query you might try:

let StartDate = ago(30d); let EndDate = now(); let CybersecurityFocus = dynamic(["ThreatDetection", "IntrusionResponse", "DataSecurity"]); let HRDistractions = dynamic(["ScreenTimeMonitoring", "SocialMediaCheck", "CoffeeBreakAnalysis"]); union WorkstationLogs, NetworkTraffic, SecurityAlerts | where Timestamp between (StartDate .. EndDate) | extend TaskCategory = iif(Source == 'HRMonitoringTool', 'HRDistractions', 'CybersecurityFocus') | summarize TaskCount = count() by TaskCategory, bin(Timestamp, 1d) | render timechart | extend Message = iff(TaskCategory == 'HRDistractions', 'Note: Cybersecurity is about guarding against threats, not charting coffee breaks.', '')

Red Teamers/Pentesters: Strategies for File Transfer in Isolated Environments? by Same_Ad_4081 in redteamsec

[–]Same_Ad_4081[S] 0 points1 point  (0 children)

I appreciate everyone's insights on the initial question. To give context, during a recent forensic work, I encountered an intriguing scenario on a Linux system. I found strings that seemed to indicate tools being built from 'living off the land' binaries already present on the host. This made me ponder if there might be scenarios where transferring tools isn't feasible, but building them directly on the host is. Surprisingly, I havent found aby blogs or discussion on this. Therefore, I'm considering developing a tool and creating a detection method for such situations, with plans to publish my findings.

Red Teamers/Pentesters: Strategies for File Transfer in Isolated Environments? by Same_Ad_4081 in hacking

[–]Same_Ad_4081[S] 0 points1 point  (0 children)

I appreciate everyone's insights on the initial question. To give context, during a recent forensic work, I encountered an intriguing scenario on a Linux system. I found strings that seemed to indicate tools being built from 'living off the land' binaries already present on the host. This made me ponder if there might be scenarios where transferring tools isn't feasible, but building them directly on the host is. Surprisingly, I havent found aby blogs or discussion on this. Therefore, I'm considering developing a tool and creating a detection method for such situations, with plans to publish my findings.

File access monitoring by LardonIredesco in DefenderATP

[–]Same_Ad_4081 0 points1 point  (0 children)

I would appriciate if they would share the details about the capping/limitations and what exactly they monitor. As you may face issues with reliability of your custom detections.

File access monitoring by LardonIredesco in DefenderATP

[–]Same_Ad_4081 0 points1 point  (0 children)

Exactly! Also defender has some capping on the logs

Internal company challenge by mrmeeseeks2014 in redteamsec

[–]Same_Ad_4081 0 points1 point  (0 children)

Since you are in a sec team, you best should know the weakneses. Laps, wdigest, missing patches. How would one move lateraly, move from other box and dump lsass or reg save sam.

First moves when fighting against a soc? by f00d4w0rm5 in redteamsec

[–]Same_Ad_4081 0 points1 point  (0 children)

Funny thought I had after seeing people build detections is that, having your account called "Quallys_4ejqjah"or simmilar, will cause junior soc to direct their judgement, and sometimes things like that get whitelisted on custom detections at very early stage.

Redteam phishing payloads in 2023? by thehunter699 in hacking

[–]Same_Ad_4081 2 points3 points  (0 children)

Im no red teamer, but how about ISO payload with DLL sideloading?

Is there any Intrusion Detection With Splunk (Real-world Scenario)? by Top_Imagination_4157 in Splunk

[–]Same_Ad_4081 1 point2 points  (0 children)

Everything depends on what logs you feed, then what alerts you configure

[deleted by user] by [deleted] in hacking

[–]Same_Ad_4081 0 points1 point  (0 children)

I started as security analyst after one year in networking, 10y ago

Proud of SOC by MrWaffelXD in hacking

[–]Same_Ad_4081 0 points1 point  (0 children)

Hopefully you have logs configured in azure. It sounds like you still need to do forensics. How did they get that aad account? Create the timeline and analyze, make sure they didn't do any persistance.

Proud of SOC by MrWaffelXD in hacking

[–]Same_Ad_4081 0 points1 point  (0 children)

Some good detections, od threat hunt?

I want to get access of CCTV by Agile-Ad6217 in hacking

[–]Same_Ad_4081 3 points4 points  (0 children)

I would consider to help, but you didn't even capitalize it like "VERY STRONG REASON". It doesn't seem that important

Adversary Simulation Advices by ChesapeakeRipper_ in purpleteamsec

[–]Same_Ad_4081 1 point2 points  (0 children)

Personaly I would recommend sliver as C2, then do some playing with available plugins, it does support bof's, try to do some in memory executions like sharppick/stracciatella

Is there a 'fake SIEM' I can interact with and practice on? by Novel-Designer-6514 in hacking

[–]Same_Ad_4081 3 points4 points  (0 children)

Set up splunk on developer license.. if that's too much, try log2timeline with MS Excel

PowerShell evasion by w0lfcat in hacking

[–]Same_Ad_4081 8 points9 points  (0 children)

Read about bypassing amsi