#knowledgedrop — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #knowledgedrop, aggregated by home.social.
-
Interesting observation:
Hard-coded RAM relocations (i.e. not ASLR) are actually way less common in modern day (64 bit) programs than you think. Most jumps etc. are relative and not hard-coded e.g. in the
.reloctable.I ran some velo tests and only one program on my standard Windows 10 installation with browsers had hard coded relocations: velociraptor itself.
#RAM #memory #relocation #velociraptor
PS: before someone complains: yes, 32 bit programs have
Base of Datarelocations, but that's for backwards compatibility when I'm correctly informed. -
How to filter zeek logs:
cat conn.log | zeek-cut <columns> | column -t | less -S(column and less display the columns aligned and readable)
-
#psexec can be detected by .key files:
"Starting with PsExec v2.30 [...], anytime a PsExec command is executed, a .key file gets written to the file system and will be recorded in the USN Journal on the target system. It will follow this naming convention: PSEXEC-[Source Hostname]-[8 Unique Characters].key and will be located at the C:\Windows directory." [1]
-
#psexec can be detected by .key files:
"Starting with PsExec v2.30 [...], anytime a PsExec command is executed, a .key file gets written to the file system and will be recorded in the USN Journal on the target system. It will follow this naming convention: PSEXEC-[Source Hostname]-[8 Unique Characters].key and will be located at the C:\Windows directory." [1]
-
#psexec can be detected by .key files:
"Starting with PsExec v2.30 [...], anytime a PsExec command is executed, a .key file gets written to the file system and will be recorded in the USN Journal on the target system. It will follow this naming convention: PSEXEC-[Source Hostname]-[8 Unique Characters].key and will be located at the C:\Windows directory." [1]
-
#psexec can be detected by .key files:
"Starting with PsExec v2.30 [...], anytime a PsExec command is executed, a .key file gets written to the file system and will be recorded in the USN Journal on the target system. It will follow this naming convention: PSEXEC-[Source Hostname]-[8 Unique Characters].key and will be located at the C:\Windows directory." [1]
-
There's a new'ish #linux tool similar to #sysmon by @0xrawsec from @circl
https://why.kunai.rocks/
(see also @kunai_project )PS: it is written in #rust :blobwink: