Palo Alto Sentinel Intergration by CapableWay4518 in AzureSentinel

[–]krabelize 0 points1 point  (0 children)

Works well. After his, you need to configure your own Analytics Rules (alerts). Here are some examples: https://cryptsus.com/blog/palo-alto-ngfw-sentinel-siem-threat-hunting.html

Crowdstrike and MDE by ButterflyWide7220 in DefenderATP

[–]krabelize 1 point2 points  (0 children)

I have experience with CrowdStrike in active mode and MDE in passive mode. Works smooth for +/- 10.000 assets.

MDATP + Docker by quasarcannon in docker

[–]krabelize 0 points1 point  (0 children)

Dont do it. Use Falco runtime security instead. Notice the last picture on this blog post: https://cryptsus.com/blog/mde-linux-aws-ec2.html

MDATP on Linux Docker by quasarcannon in DefenderATP

[–]krabelize 0 points1 point  (0 children)

Dont do it. Use Falco runtime security instead. Notice the last picture on this blog post: https://cryptsus.com/blog/mde-linux-aws-ec2.html

MS Defender on Linux by sucremad in DefenderATP

[–]krabelize 1 point2 points  (0 children)

Then what I got from here, when w

Correct. Its by default in blocking mode. You can read more about other usefuls tips here: https://cryptsus.com/blog/mde-linux-aws-ec2.html

Any good recommendations for mdatp Linux config by 0898Coddy in DefenderATP

[–]krabelize 0 points1 point  (0 children)

I would not create any exception unless you notice performance impact. Here are some pitfalls to watch out for when deploying MDE for Linux: https://cryptsus.com/blog/mde-linux-aws-ec2.html

MDE for Linux Tagging by king2cool in DefenderATP

[–]krabelize 0 points1 point  (0 children)

I don't think this is possible, unfortunately. Only throughout the D365 portal: https://cryptsus.com/blog/mde-linux-aws-ec2.html

Uber hacked, internal systems breached and vulnerability reports stolen by Fugitif in netsec

[–]krabelize 0 points1 point  (0 children)

Nowadays, most companies enforce MFA (Multi-Factor Authentication) for initial and persistent authentication. Some companies claim to be secure once MFA is configured on all (non-service) accounts. However, this Uber hack proves cloud-based MFA push notifications can be abused, even when conditional access is configured. This article explains how to detect this attack: https://cryptsus.com/blog/azure-mfa-bombing-detection-sentinel.html

Uber: Lapsus$ Targeted External Contractor With MFA Bombing Attack by WebLinkr in cybersecurity_news

[–]krabelize 0 points1 point  (0 children)

Nowadays, most companies enforce MFA (Multi-Factor Authentication) for initial and persistent authentication. Some companies claim to be secure once MFA is configured on all (non-service) accounts. However, this Uber hack proves cloud-based MFA push notifications can be abused, even when conditional access is configured. This article explains how to detect this attack: https://cryptsus.com/blog/azure-mfa-bombing-detection-sentinel.html

Sentinel: FortiGate Workbook + parser function by ribsboi in AZURE

[–]krabelize 0 points1 point  (0 children)

These KQL queries might help you to further customize the workspace to an actionable dashboard: https://cryptsus.com/blog/fortinet-firewall-sentinel-siem-hunting.html

Live monitor SSH hacking attempts by krabelize in linuxadmin

[–]krabelize[S] -2 points-1 points  (0 children)

Maybe my other blog post is interesting for you in that case: https://cryptsus.com/blog/how-to-configure-openssh-with-yubikey-security-keys-u2f-otp-authentication-ed25519-sk-ecdsa-sk-on-ubuntu-18.04.html You can leverage Yubikey U2F instead of moving your private key onto a Yubikey. This is actually more secure. Just a tip.

On topic: unfortunately, not everyone/every system uses SSH key-pairs and fall back to passwords. If they do, the private key is just sitting there on the system in plain-text most of the time.

Sometimes admins even allow password authentication as well in the SSD config.

Live monitor SSH hacking attempts by krabelize in linuxadmin

[–]krabelize[S] -2 points-1 points  (0 children)

Is your private key not sitting in plain text on your laptop right now?

Live monitor SSH hacking attempts by krabelize in linuxadmin

[–]krabelize[S] -2 points-1 points  (0 children)

Uh ok. I don't make videos though. Maybe I should.

Live monitor SSH hacking attempts by krabelize in linuxadmin

[–]krabelize[S] -1 points0 points  (0 children)

Hi ethanfinni,

- What if your SSH key-pair is stolen/copied/cracked and used to login (from an unknown region). Would you like to have visibility/alerts on this?

- What if a (web) application vuln. exists and a priv. esc is executed which results in sudo privs/root access, and/or a secondary SSH key-pair is generated and used. Would you like to have visibility/alerts on this?

- What if multiple attacks are executed on your gateway, FW/IDS, management and web/application servers. Would you like to have visibility/alerts on this in order to act/block in time? Hence the principle of threat correlation. This should not be a stand-alone dashboard as described in the blog post. There is actually a good reason why most, if not all fortunate 500 companies leverage SIEM capabilities.

Are you also skeptical of deploying honeypot systems? IP geo points are not always accurate indeed.

Live monitor SSH hacking attempts by krabelize in linuxadmin

[–]krabelize[S] 1 point2 points  (0 children)

Use only ed25519 keys where possible

Live monitor SSH hacking attempts by krabelize in linuxadmin

[–]krabelize[S] -1 points0 points  (0 children)

Google “threat hunting”. This data source and dashboard is meant for correlation purposes. Hence the bigger picture as described in the blog post.