home.social

#defenseevasion — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #defenseevasion, aggregated by home.social.

  1. Phishing emails that look legit and hidden DLLs are paving the way for a new breed of cyber threats. How did attackers upgrade from a simple infostealer to a full-blown RAT? Dive into the evolution of PureRAT to find out.

    thedefendopsdiaries.com/dissec

    #purerat
    #cyberattack
    #dllsideloading
    #remotetrojan
    #defenseevasion

  2. Adversary Village at @defcon 32 Creator stage talks
    Melvin Langvik will be delivering a technical talk on “Evading Modern Defenses When Phishing with Pixels”.
    Talk schedule: 11:00 - 11:30 PDT | Aug 10th 2024 | DEF CON Creator Stage 3 | Las Vegas Convention Center.
    More information on the talk: adversaryvillage.org/adversary And defcon.org/html/defcon-32/dc-3
    Schedule for Adversary Village at DEF CON 32: adversaryvillage.org/adversary
    #AdversaryVillage #DEFCON #WeEngage #DEFCON32 #AdversaryTradecraft #DefenseEvasion

  3. DLL proxying has been a fun learning experience :D
    There are even tools that can show the exported functions of a binary so you don't have to manually figure out which functions to forward!

    #security #dll #proxying #defenseevasion

  4. Finally adding additional security checks to our help desk team was a big win yesterday!
    I have my talk at Penn State tomorrow where I'll be talking about macOS defense evasion and RDP honey pots!

    For today, I think I'll be just knocking out some low hanging fruit tickets, tomorrow is going to be a busy day. LETS GO :D

    #security #helpdesk #socialengineering #macos #defenseevasion #honeypot

  5. Happy Wednesday! I am going to be going into the office with the interns today. They have an in person HRish like meeting to attend so I figured why not show my ugly mug.

    We learned about process hooking yesterday. I think today we are going to continue to focus on defense evasion stuff. I also have them working on a handful of projects. They are small, but the impact will be big.

    #security #interns #processhooking #defenseevasion

  6. Good day everyone! I hope everyone is enjoying their Wednesday!

    In a recent report by Bitdefender Labs, they took a deep-dive into the threat group #CharmingKitten and their latest malware, #BellaCiao. It is a great read, but some main behaviors that I pulled from the report included:

    #DefenseEvasion:
    T1562.001 - Impair Defenses: Disable or Modify Tools
    Charming Kitten used powershell to disable real-time monitoring on the machine to avoid detection.

    #Persistence:
    T1053.005 - Scheduled Task/Job: Scheduled Task
    They also created scheduled tasks to run on start and used the technique of masquerading their process names to blend in.

    #Execution:
    The Bitdefender team provided the locations that the executables were written to.

    You should go and check out this #readoftheday, it contains great technical details that you can use to improve your threat hunting skill.
    Enjoy and Happy Hunting!

    #CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting

  7. "Injecting pc.dll into LSASS as a Security Package. Security Packages are used to extend the Windows authentication mechanism and can be abused to execute malicious code in the context of LSASS" - I was today years old when I learned this!

    sentinelone.com/labs/operation

    #security #S1 #LSASS #defenseevasion #apt

  8. New blog post: Abusing Code Signing Certificates.

    I cover what authenticode signatures are, how to validate them, using SigThief to copy a trusted cert to a malicious file and what adversaries use this technique.

    axelarator.github.io/posts/cod
    #ThreatIntel #RedTeam #DefenseEvasion #CTI

  9. Counter sandbox evasion by using Debloat to remove all the unnecessary junk bytes within binaries.
    #DefenseEvasion

    github.com/Squiblydoo/debloat

  10. Some defense evasion PS commands to keep an eye out for:

    Prevent logging: Set-PSReadlineOption -HistorySaveStyle SaveNothing

    Delete history file: Remove-Item (Get-PSReadlineOption).HistorySavePath

    Set alternate file path: Set-PSReadLineOption -HistorySavePath $env:TEMP\out.txt

    Use ConstrainedLanguage mode: $ExecutionContext.SessionState.LanguageMode = “ConstrainedLanguage”

    #defenseevasion #powershell #security #detection #SIEM #logging

  11. I've found that b64 is used for defense evasion when sending PowerShell or cmd commands. I imagine there are other popular encoding methods, has anyone seen any other big ones crop up lately?

    #defenseevasion #powershell #base64