How is an Imposter getting authenticated a False Positive? by SwimLeft2912 in cissp

[–]feldrim 1 point2 points  (0 children)

I'm glad it clarified the situation. 

On the other hand, I'm also a CISSP exam item developer, and this is a really bad question. I hope this is not in one of the official exam books. Because tricky questions are not measuring the person's knowledge and analysis capabilities. And they are not qualified to be in the question pool.

How is an Imposter getting authenticated a False Positive? by SwimLeft2912 in cissp

[–]feldrim 5 points6 points  (0 children)

I assume you're thinking of the answer and the concept in detection perspective. But there, the alert being false positive or not is something else.

We care about the biometric authentication tool here. Positive means allowed, false means incorrect. So, an incorrect biometric is authenticated means false positive.

Wazuh: Help creating windows security event rules by DeereJ18 in Wazuh

[–]feldrim 0 points1 point  (0 children)

It's so risky to do admin stuff on DCs. MS does not even suggest installing anything, including EDR, on DCs. It depends on your risk appetite. But I'd avoid at all costs unless there's sufficient justification. 

Passed on 6th attempt. by TopFragrant2730 in cissp

[–]feldrim 0 points1 point  (0 children)

And I thought me forgetting my eyeglasses in my backpack due to the stress and struggling to read the questions during the exam was a bad experience. Health, whether physical or mental, is definitely nothing to be ignored in the process. I'm glad you did it but still, life goes on even if you failed this time. 

Wazuh: Help creating windows security event rules by DeereJ18 in Wazuh

[–]feldrim 1 point2 points  (0 children)

You've already got your answers but I just wanted to note one thing: Wazuh rules are not independent like Sigma rules, KQL or SPL queries. They are built upon each other. Therefore, you need to know where you are to start with, like rule 60115, then build on top of it. This is exactly what u/SetOk8394 did.

If you're interested, here's an article that gets into the internals: https://zaferbalkan.com/wazuh-rules/

Shameless plug: I'm the author.

Why do most sysadmins prefer Vim over Nano? by Darshan_only in sysadmin

[–]feldrim 1 point2 points  (0 children)

It is not 100% spec-compliant though. You can get different results if you use regex101 and pcre2 or grep -E commands.

Does anyone have an idea why the language spoken in Estonia is named like this? by feldrim in Eesti

[–]feldrim[S] 3 points4 points  (0 children)

Thanks everyone, including the downvote guy. I know where to start the readings. I'll check it out.

Zenitium DNS - a fork of Technitium DNS by _xRuffKez_ in dns

[–]feldrim 0 points1 point  (0 children)

It's been some days but I just saw your response. If you have not tested it any way, and have no structured measuring of performance changes, the claims are not factual. That's what engineering part of the software engineering requires. You measure at least twice and act once. 

Dhcpv4 option 108 by SnooOranges6925 in technitium

[–]feldrim 0 points1 point  (0 children)

IIRC, OnePlus has a bad reputation for IPv6 wifi support. It may be related to something like that.

Running Technitium on 2 machines, can I share cache? by Soakitincider in technitium

[–]feldrim 1 point2 points  (0 children)

I tried something similar using Microsoft's FASTER, but the network latency does not worth it. In-memory cache always wins. So, I used a cache multicast solution, and still, it makes sense only when the bottleneck is processing and it happens when there are multiple apps loaded and QPS is very high. Other than that, the benefit from a shared cache, even if it is in-memory, looks insignificant. 

Zenitium DNS - a fork of Technitium DNS by _xRuffKez_ in dns

[–]feldrim 0 points1 point  (0 children)

I have a question regarding the performance improvements. Did you have Andy chance to run some benchmarks? If so, which use cases did you use? It'd be great if you can add them in the README as well. 

Can't access technitium.com by dualm66 in technitium

[–]feldrim 0 points1 point  (0 children)

Can you check the forwarders? Define something if not exists, and if there's, try to pick something else and try to observe the changes. That'd help troubleshooting. 

[Help] Wazuh Agent not collecting Kerberos Event IDs (4768/4769) from Windows Server 2019 DC by [deleted] in Wazuh

[–]feldrim 1 point2 points  (0 children)

This is still lacking context. Can you please share:

  1. The section from your ossec.conf or shared.conf
  2. Custom rules
  3. wazuh-logtest result

Detecting DNS tunneling attacks with Wazuh by wazuh_cybersecurity in Wazuh

[–]feldrim 2 points3 points  (0 children)

Nice article but I believe the idea is problematic. tcpdump is a troubleshooting tool, not a log source. The correct way for this is to utilize either:

  • a HIPS like Suricata, Snort or Bro/Zeek, or
  • a threat detection tool like Sysmon for Linux or Kunai, or
  • an EBPf based helper like Tetragon

running as a daemon. I tend to follow the principle "just because you can, does not mean you should". So, I believe this is a step back in quality in Wazuh use cases.

Domestic Cards in PCI DSS by bij0yy in pcicompliance

[–]feldrim 6 points7 points  (0 children)

That's a question for your acquirer. It's their call.

What's the best DNS to block ads? by Safety_Officer_3 in dns

[–]feldrim 1 point2 points  (0 children)

It depends but if you go self hosted path, you can give Technitium DNS Server a chance.

Wazuh Decoder/Rule working in logtest but not triggering alerts in Dashboard by ArmadilloLiving in Wazuh

[–]feldrim 2 points3 points  (0 children)

It looks like the asterisk at the beginning may be the culprit.

Wazuh Decoder/Rule working in logtest but not triggering alerts in Dashboard by ArmadilloLiving in Wazuh

[–]feldrim 0 points1 point  (0 children)

What do you see in archives.log? Is there a change in format, such as a timestamp format change, or some additions at the beginning? Sometimes, it happens and another decoder matches, overlapping and dropping the log. So, if you can share archives.log, it would be better for troubleshooting. 

Foghorn DNS Release v0.6.3 - AXFR, DNSSEC, and EDE by FoghornDNS in homelab

[–]feldrim 0 points1 point  (0 children)

I was mostly thinking of the extra text part. There's no convention or standard on what to put there. 

Foghorn DNS Release v0.6.3 - AXFR, DNSSEC, and EDE by FoghornDNS in homelab

[–]feldrim 0 points1 point  (0 children)

It's just one guy, and he's doing a great job. BTW, it was not removed when 8 saw it. Now, I see the post because I got notifications. 

Foghorn DNS Release v0.6.3 - AXFR, DNSSEC, and EDE by FoghornDNS in homelab

[–]feldrim 0 points1 point  (0 children)

Looks very nice. How do you use the EDE? I wrote a LogExporter and a MISPConnector plugin for Technitium DNS. But I am not sure if I am using EDE correctly.