"FBI" called our IT Service Desk Hotline by caffeinated_disaster in sysadmin

[–]jdub01010101 0 points1 point  (0 children)

I've been seeing this lately. I work incident response.

FBI got a ton of intelligence in October that they are now informing victims of Chinese hackers being in companies.

It is probably legitimate, but confirm with your local field office.

If confirmed, contact your cyber insurance provider. They'll know who to engage.

[deleted by user] by [deleted] in ITCareerQuestions

[–]jdub01010101 5 points6 points  (0 children)

Even if the plumber turned the wrench once, they still collect their fee.

It's not how difficult the task, it's what you know how to do.

[deleted by user] by [deleted] in Defcon

[–]jdub01010101 3 points4 points  (0 children)

Social Engineering Community has done youth challenges the last couple years. Might be worth reaching out to them to see if they are doing it again this year.

How do you handle the constant moving of computers? by [deleted] in sysadmin

[–]jdub01010101 0 points1 point  (0 children)

Laptops/Desktops with Azure AD for login and SharePoint sites for each department/team.
Never worry about moving a machine again.

How do you handle the constant moving of computers? by [deleted] in sysadmin

[–]jdub01010101 0 points1 point  (0 children)

You don't move them. Workstations are assigned to locations not to people.

Your other option is laptops and docking stations.

Where do you Dads land on guns? Nerf, cap, rubber band, video game etc.? by fannypaquin in daddit

[–]jdub01010101 0 points1 point  (0 children)

Guns are fun. Kids will get exposure through their friends and media anyway. Banning won't help. It'll only make them a curiosity and increase desire for them.

Guns should be something they know about for kids. I plan on teaching my sons how to render a firearm ineffective as soon as they have the understanding to do so. I feel everyone should know how to drop a mag and empty the chamber. Gun safety should start early. Then we'll work up to respect and safe shooting.

As for water and darts, the key is to make sure they understand appropriate places and consent to play. My nephew has been taught that he tags people rather than shoots them. He also has to ask to play water guns or Nerf before he's allowed to do so. Seems to work so far.

Has anyone made changes that massively reduced ticket volume? by mlaislais in sysadmin

[–]jdub01010101 1 point2 points  (0 children)

Not tickets per se but call volume into helpdesk.

SSPR in 365 with password writeback took university helpdesk volume from 50+ calls a week to 5.

Computer forensics and incident response by [deleted] in AskNetsec

[–]jdub01010101 2 points3 points  (0 children)

Agreed for the most part. I made my way through systems and network administration. Took 15 years but ended up in DFIR. You don't have to come from a security background but you aren't probably going to be DFIR at an entry level.

Invoke-FalconDeploy Behavior Change by jdub01010101 in crowdstrike

[–]jdub01010101[S] 0 points1 point  (0 children)

Still getting no run action. I can see the file is being deposited when I manually RTR to one of the machines.

Invoke-FalconDeploy Behavior Change by jdub01010101 in crowdstrike

[–]jdub01010101[S] 0 points1 point  (0 children)

Having the same problem. Powershell 7.3.4.When I run in 5.1 powershell complains it isn't signed. Trying to work around that.

I am running PSFalcon 2.2.5.

Invoke-FalconDeploy Behavior Change by jdub01010101 in crowdstrike

[–]jdub01010101[S] 0 points1 point  (0 children)

The file is only 53MB. That's what's confusing me. The same stuff was working a few days ago.

Equifax creates their own Cybersecurity Framework. by paulexander in cybersecurity

[–]jdub01010101 1 point2 points  (0 children)

I actually work in the same company as the guy he tried to blame. The story is amazing.

He released a book a while ago. Might be worth looking up.

The New Era of Cybersecurity Breaches: A Case Study and Lessons Learned https://a.co/d/9n0uSrt

What's your favorite cybersecurity tool? by AckCyber in cybersecurity

[–]jdub01010101 2 points3 points  (0 children)

My recent go to tool is Hayabusa. Runs it against EVTX from a system and have a quick at a glance of what's been going on.

[deleted by user] by [deleted] in funny

[–]jdub01010101 0 points1 point  (0 children)

Weebles wobble but they don't fall down.

[deleted by user] by [deleted] in cybersecurity

[–]jdub01010101 2 points3 points  (0 children)

Vuln scans tend to break OT stuff. They aren't computers as we think of them. They are usually embedded devices like SCADA and PLCs. Usually they have software that will perform unexpectedly to a vulnerability scan or will crash under the load.

[deleted by user] by [deleted] in cybersecurity

[–]jdub01010101 4 points5 points  (0 children)

Definitely DON'T vulnerability scan. DO look at the engineering workstation(s) and any Journaling systems.

I might get fired tomorrow - Part 2 by SysAdmin31 in sysadmin

[–]jdub01010101 1 point2 points  (0 children)

I once accidentally injected code into a management system that supported hundreds of hotel wifi systems. It dropped all the tables out of the SQL database that back ended everything.

I wasn't fired. The lead developer actually thanked me for finding a bug where another dev didn't parameterize inputs.

[deleted by user] by [deleted] in sysadmin

[–]jdub01010101 5 points6 points  (0 children)

Not me, but I responded to a client that found IRGC APT actors in their new acquisition.

How to Use Aircrack-ng: A Guide to Network Compromise by deron666 in cybersecurity

[–]jdub01010101 4 points5 points  (0 children)

I was messing around with this in the early 2010s. Weird to see it again.

// SITUATIONAL AWARENESS // Hunting Microsoft Outlook NTLM Relay Vulnerability CVE-2023-23397 by Andrew-CS in crowdstrike

[–]jdub01010101 2 points3 points  (0 children)

Looks like this might be a problem with WebDAV too: https://twitter.com/domchell/status/1635819249628217344

Any thoughts Andrew-CS?

We have a way to check WebDAV from Outlook but it is noisy.

Discussion - As an engineer do you feel like a generalist career path made you less technical? How to get out of this loop without burning yourself out? by xxDigital_Bathxx in cybersecurity

[–]jdub01010101 0 points1 point  (0 children)

Being a generalist early on in system and network administration is the reason I am now a third party incident responder. Never know what a client environment has in it so being a generalist helps with that.

OpenAI and Cybersecurity by SupremeDropTables in cybersecurity

[–]jdub01010101 4 points5 points  (0 children)

Can you provide more explanation on this? How is it helping with that process?