@Inn3rFir3 Profile picture

MadeInLogs

@Inn3rFir3

Joined April 2019
Similar User
Patrick photo

@patricksvgr

darkdefender photo

@_darkdefender_

Caleb Yu photo

@CA8L3

Skylar photo

@SecurityWard

Yuri photo

@C0ngrammer

Sean photo

@SeanKP13

phant0m photo

@phant0mbot

Manny photo

@MZpda805

James Curbow photo

@your_b1gbroth3r

MadeInLogs Reposted

🚨🔥 LOLRMM IS LIVE! 🔥🚨 The wait is over, folks! 🥳🎉 We’re thrilled to announce the official release of LOLRMM — your new go-to tool to detect and counter RMM abuse! 🕵️‍♂️💻 👉 Check it out NOW at LOLRMM.io 👈 This couldn’t have been possible without our amazing…


MadeInLogs Reposted

So I did a threat on entering DFIR that people liked. About 3 months ago, I switched to CTI. It was no easy switch, as I realized I had to use a side of my brain in interviews that went beyond the technical reporting. So I figured i would share resources!


MadeInLogs Reposted

There are these days ... 🚬⛽️💥

Tweet Image 1
Tweet Image 2


MadeInLogs Reposted

Need an almost invisible, post-exploitation, persistent, fileless, LPE backdoor? There are many, but this one looks really beautiful for me: type "sc.exe sdset scmanager D:(A;;KA;;;WD)" from an elevated command prompt.

Tweet Image 1

MadeInLogs Reposted

#PowerShell tip: if you're using `Get-Content` to simply read a file, it's much faster to use [System.IO">System.IO.File]::ReadAllBytes() or [System.IO">System.IO.File]::ReadAllText() even in a pipeline. About 95% faster! `Get-Content` is useful if you want objs per line.


MadeInLogs Reposted

If done correctly, it is pretty effective. Having worked in an agile way for the last 2 years, here is some personal opinion 🧵: 1/9 #agile #threathunting #detectionengineering #soc

There are these days ... 🚬⛽️💥

Tweet Image 1
Tweet Image 2


MadeInLogs Reposted

Demystifying the “SVCHOST.EXE” Process and Its Command Line Options nasbench.medium.com/demystifying-t… >> A definitive reference by @nas_bench


MadeInLogs Reposted

I have put together this list of Remote Admin tools that are abused by threat actors, thanks to @jamieantisocial and @SwiftOnSecurity for a great thread. Please feel to contribute for the ones I missed! Ammyy AnyDesk Atera Chrome Remote Desktop ConnectWise Dameware


MadeInLogs Reposted

New blog post: Capturing Detection Ideas to Improve Their Impact cyb3rops.medium.com/capturing-dete…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

MadeInLogs Reposted

At @SpecterOps, @leidy_tector and I focus on maturing detection engineering teams. This blog explores our methodology for prioritizing the detection engineering backlog. posts.specterops.io/prioritization…


MadeInLogs Reposted

If you enjoyed this thread, please: 1. Subscribe to my newsletter: tessardavis.com/newsletter/ 2. Retweet the first tweet of the thread: twitter.com/TessaRDavis/st…

10 TED talks to watch in your 30s:



MadeInLogs Reposted

5\ METHOD 3: Review Azure Sign-in Logs or UAL These will show logons into a user account originating from the malicious application. It's important you do Method 2 before Method 3 so you can get the application object ID and application name to make this high-fidelity ;)

Tweet Image 1

MadeInLogs Reposted

Cobalt Strike ain't 💩 Let's chat about how to unravel Cobalt Strike and deny the adversary further access As ALWAYS, I am showing you data so fresh out the kitchen it hasn't even been cleared by ThreatOps Director @MaxRogers5 👀🧑‍🍳 🧵


MadeInLogs Reposted

Lateral movement with Outlook + WMI COM objects

Tweet Image 1
Tweet Image 2

MadeInLogs Reposted

Building out a #ThreatHunting program can be scary! @H3dTr1p shares his ‘Crawl, Walk, Run’ approach, which tactically breaks down the individual Threat Hunt building process & provides organizations a strategic option to meet their program objectives hubs.la/Q0171xb50


MadeInLogs Reposted

New Challenge -> Pwned-DC (Active Directory Case). Adversaries were able to take over the corporate domain controller. Investigate the case and reveal the Who, When, What, Where, Why, and How. cyberdefenders.org/blueteam-ctf-c… #DFIR #BlueTeam #InfoSec #CyberSecurity


MadeInLogs Reposted

Detection engineers don't just produce or apply IOCs Detection engineers transform observed activity into detection rules (which includes IOCs) E.g. when I watch talks on TA activity I write rules on a scratch pad. They usually differ from the IOCs provided with the reports.

Tweet Image 1
Tweet Image 2
Tweet Image 3

MadeInLogs Reposted

READ OUR RESEARCH: Sockbot in GoLand - Linking APT Actors with Ransomware gangs securityjoes.com/blog Full report: …reports.s3.eu-central-1.amazonaws.com/Sockbot%2Bin%2…


Loading...

Something went wrong.


Something went wrong.