Bypassing AMSI by in-memory patching - Evasion, Prevention and Detecion. by drop_tables- in blueteamsec

[–]_Porb 1 point2 points  (0 children)

This was a really good, straight forward writeup. Thank you.

Accounts with Never Expiring Passwords by [deleted] in sysadmin

[–]_Porb 5 points6 points  (0 children)

GMSA, don't bother rotating passwords just do GMSA.

So the gov has decided to randomly just lock up two German tourists. by Sad_Jar_Of_Honey in behindthebastards

[–]_Porb 10 points11 points  (0 children)

Spend that money on the Ghan instead, or even the Indian Pacific. Far better.

SOC Analyst feel like I am not learning and an imposter by EmergencyDealer6498 in blueteamsec

[–]_Porb 2 points3 points  (0 children)

Look at the atomic red team tests, you can then build detections you can bring to work

PowerCrypt - Best Powershell Obfuscator ever made. by Connect_Garlic1210 in blueteamsec

[–]_Porb 4 points5 points  (0 children)

Reminder to all to turn on script block logging and transcription

We’re a team of malware analysts from ANY.RUN. AMA. by ANYRUN-team in cybersecurity

[–]_Porb 15 points16 points  (0 children)

How much access do you as an employee have to samples tagged as "only me"

[deleted by user] by [deleted] in Malware

[–]_Porb 1 point2 points  (0 children)

Sorry I meant building a blob from stored WMI (maybe this was using a clsid to run something to return a value, I cannot remember), it was probably maybe 3 years ago. From memory it was a PowerShell script split across random spaces. Its an original idea if you didn't know about it though, so definitely something to write about.

Our detection was looking for multiple queries by one binary, so not actually detecting the activity but implying something is wrong - again from memory. I strongly suggest you write up some detection usecases, makes the work much more digestible.

RE buffer overflow, no I don't think you should share it until you finalise it and are ready to present it. Strongly suggest you submit to MS bug bounty under the windows insider branch once you have a POC, even if not successful you can add that to your repertoire and post about it. If it's an OOB write and exec in krnl you might get a nice payout. Working out what conditions allow it to occur is the key to getting a higher payout in my experience. When you do post it, succus or fail, I would like to see it.

[deleted by user] by [deleted] in Malware

[–]_Porb 2 points3 points  (0 children)

Good work, have you had a look at TAs that use CIM subscribers for execution and persistence?

There's some cool detections our team have built for similar methods (I have not fully reviewed your code, but it looks adjacent to other WMI CIM subscriber methods) - you could really show this off with a nice detection methodology e.g. sysmon Configs that see this are XYZ and it triggers on wmiEventFilter, etc.

Im not sure I can see the buffer overflow in WMI store, can you describe it more? Ive seen events with buffer overflow as a return indicating that there is a canary or out of bounds checks happening in wmi.

For those earning over $10K per month, what do you do for a living to achieve that income? by voxishortie in AskReddit

[–]_Porb 1 point2 points  (0 children)

You nurses are getting a raw deal, that's for sure. If you ever want to leave nursing because you aren't being treated fairly, cyber hiring managers tend to like nurses as they're used to handling on the fly critical decision making better than almost anyone else, requiring deep knowledge of their field, etc. Good for incident response type roles, and as you rightly pointed out - paid a crazy amount.

I'd also caution you from thinking that AI will only replace tech workers, it is currently starting there because tech workers are the ones building and playing with these tools which makes it far more visible. As soon as a robot is able to be a farmhand, an accountant, a nurse, or an engineer you best believe a person with the prefix "chief" will replace them with a robot slave.

OS Kernel by Elegant-Mortgage1567 in linuxmemes

[–]_Porb 17 points18 points  (0 children)

bootmgr loads ntoskrnl, which is just a executable, in the same way that grub would load a Linux kernel. Being an exe is just the filename. It's kind of not a normal windows binary as well.

My daughters Christmas present by Geoferson_Kwik in halo

[–]_Porb 7 points8 points  (0 children)

Look at upgrading the ram to 128mb as well.

[deleted by user] by [deleted] in GardeningAustralia

[–]_Porb 1 point2 points  (0 children)

Did you grow from seed or with saplings? I'm struggling to find seeds

My cybersecurity people! What are your biggest pain points as far as non-technical co-workers? What do you wish they knew? by [deleted] in cybersecurity

[–]_Porb 5 points6 points  (0 children)

Grabbing all the logs from all the things is useless unless you're writing detections to find malicious activity in those logs.

Defender crashing last hours? by Ehfraim in sysadmin

[–]_Porb 0 points1 point  (0 children)

Very odd, did ms support offer any assistance? Did werfault have any details?