Le Ngoc Long Reposted

Linux Live Analysis Knowledge Base, Tips & Tricks w0-0p.github.io/Linux-Forensic…


Le Ngoc Long Reposted

I’d love to see @CISAgov publish a ‘Top 10 Vendors’ list for releasing products with serious, frequently exploited vulnerabilities (CVSS > 8.5). It’d be a data-driven ‘wall of shame’ based on their exploited vulnerability reports. If they won’t do it, I might. And if a vendor…

🚨 Fortinet CVE-2024-23113 - actively exploited by state-sponsored hackers - is now being exploited by cybercriminals who have reverse-engineered it and are selling access to compromised devices If you haven't patched, restrict port 541 to approved IPs or enforce cert auth.

Tweet Image 1


Le Ngoc Long Reposted

If you add a . (dot) before a file name, it becomes hidden in Linux. That's not a secret. But do you know that this "feature", was actually a bug?

Tweet Image 1

Le Ngoc Long Reposted

Our talk from @defcon is now available! In the presented research, we document every EDR bypass technique used in the wild along with how to detect it using new memory forensics techniques and @volatility plugins. Feedback appreciated! youtube.com/watch?v=PmqvBe… #DFIR


Le Ngoc Long Reposted

🚨EDR Telemetry website is live! 🥳 I hope this makes it even easier for folks to compare the telemetry of EDR vendors and visualize their visibility gaps 🙂 ‣ Website🔗edr-telemetry.com ‣ GitHub 🔗github.com/tsale/edr-tele… **Telemetry results reflect the most recent…

Tweet Image 1

I created the first draft of a website for the EDR telemetry project to help people quickly compare vendor telemetry visibility. What do you think about it? Are there any specific features you want to see for the website? Built with ChatGPT 4o with canvas (wanted to test it…



Le Ngoc Long Reposted

I wanted to learn more about using content delivery networks (CDNs) in Azure in conjunction with an Nginx reverse proxy in the context of using Cobalt Strike as a C2 framework. As a result, I've written the following blog post. redops.at/en/blog/cobalt… #redteam


Le Ngoc Long Reposted

really excited about LockBit's new certification, CBTO (Certified Black Team Operator) Black Team Ops is an online, self-study course that teaches core concepts of being an adversary, including configuration of cracked cobalt strike, money laundering, and RAAS payload deployment


Le Ngoc Long Reposted

Cybersecurity GPTs

Tweet Image 1

Le Ngoc Long Reposted

I had a great time to learn how to deploy and use Timesketch. Honestly, I am parsing Windows event logs by Hayabusa and importing them to Timesketch. Unfortunately, the graph plugins do not work. I decided to customize the plugin to work. github.com/n0bit4lsm3/Tim…


Le Ngoc Long Reposted

Two new OpenRelik workers released today: 1. Hayabusa from @SecurityYamato - Analyze your Windows Event Logs. 2. Timesketch exporter - export your timelines seamlessly. #DFIR #OpenRelik 🧵👇See this thread for screencasts:

Tweet Image 1

Le Ngoc Long Reposted

The #linux detection engineering saga continues! Breakdown persistence techniques both simple and complex in this new article from @RFGroenewoud: go.es.io/3X6w7k9 #ElasticSecurityLabs #detectionengineering


Le Ngoc Long Reposted

The best way to learn how real threat actors operate is to read the many published threat reports on their activity DFIR Report thedfirreport.com APT Groups and Operations docs.google.com/spreadsheets/d… ORKL orkl.eu/sources I’ll add more links in the replies 🧵


Le Ngoc Long Reposted

If you're interested in getting into #Linux #logging and evidence collection, this is an excellent write-up from @Kostastsale that compares #EVTX logs on Windows with #Auditd, #SysMon for Linux, and native Linux logging. #DFIR #LinuxForensics #SIEM #CSIRT kostas-ts.medium.com/telemetry-on-l…

Tweet Image 1

Le Ngoc Long Reposted

* Always check open file descriptors per process, because there you can find other interesting differences * Use simple Yara rule + Velociraptor's Linux.Detection.Yara.Process to hunt at scale easily

Tweet Image 1

Le Ngoc Long Reposted

#OSINT #SOCMINT At the request of many, I share with you an almost complete tool called “OSINT Investigation Assistant”, which contains a large set of useful resources for OSINT, categorized by #tags. ➡️ RESOURCE: lambda.black/osint.html Source: t.me/irozysk/13331

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.