Category: SANS Internet Storm Center, InfoCON: green

WiFi IDS and Private MAC Addresses, (Wed, Apr 7th)

Read the original article: WiFi IDS and Private MAC Addresses, (Wed, Apr 7th) I recently came across “nzyme” [1], a WiFi Intrusion Detection System (IDS). Nzyme does focus on WiFi-specific attacks, so it does not care about payload but inspects…

YARA and CyberChef: ZIP, (Sun, Apr 4th)

Read the original article: YARA and CyberChef: ZIP, (Sun, Apr 4th) When processing the result of “unzip” in CyberChef, for example with YARA rules, all files contained inside the ZIP file, are concatenated together.   Become a supporter of IT…

Video: YARA and CyberChef, (Sat, Apr 3rd)

Read the original article: Video: YARA and CyberChef, (Sat, Apr 3rd) In diary entry “YARA and CyberChef”, I explain how to use YARA rules together with CyberChef.   Become a supporter of IT Security News and help us remove the…

C2 Activity: Sandboxes or Real Victims?, (Fri, Apr 2nd)

Read the original article: C2 Activity: Sandboxes or Real Victims?, (Fri, Apr 2nd) In my last diary[1], I mentioned that I was able to access screenshots exfiltrated by the malware sample. During the first analysis, there were approximately 460 JPEG…

April 2021 Forensic Quiz, (Thu, Apr 1st)

Read the original article: April 2021 Forensic Quiz, (Thu, Apr 1st) Introduction   Become a supporter of IT Security News and help us remove the ads. Read the original article: April 2021 Forensic Quiz, (Thu, Apr 1st)

Jumping into Shellcode, (Mon, Mar 29th)

Read the original article: Jumping into Shellcode, (Mon, Mar 29th) Malware analysis is exciting because you never know what you will find. In previous diaries[1], I already explained why it's important to have a look at groups of interesting Windows API…

TCPView v4.0 Released, (Sun, Mar 28th)

Read the original article: TCPView v4.0 Released, (Sun, Mar 28th) TCPView is a Sysinternals' tool that displays information about the TCP and UDP endpoints on a system. It's like netstat, but with a GUI.   Become a supporter of IT…

Office macro execution evidence, (Fri, Mar 26th)

Read the original article: Office macro execution evidence, (Fri, Mar 26th) Microsoft Office Macros continue to be the security nightmare that they have been for the past 3 decades. System and security admins everywhere continue to try to protect their…

The 2021 SANS Security Awareness Report is out. Learn data-driven lessons learned how organizations around the world are effectively managing their human risk https://www.sans.org/security-awareness-training/sareport-2021, (Tue, Mar 23rd)

Read the original article: The 2021 SANS Security Awareness Report is out. Learn data-driven lessons learned how organizations around the world are effectively managing their human risk https://www.sans.org/security-awareness-training/sareport-2021, (Tue, Mar 23rd) —   Become a supporter of IT Security News…

Nim Strings, (Mon, Mar 22nd)

Read the original article: Nim Strings, (Mon, Mar 22nd) On Tuesday's Stormcast, Johannes talked about malware written in the Nim Programming language.   Become a supporter of IT Security News and help us remove the ads. Read the original article:…

March 2021 Traffic Analysis Quiz, (Tue, Mar 23rd)

Read the original article: March 2021 Traffic Analysis Quiz, (Tue, Mar 23rd) Introduction   Become a supporter of IT Security News and help us remove the ads. Read the original article: March 2021 Traffic Analysis Quiz, (Tue, Mar 23rd)

YARA Pre-release v4.1.0, (Sat, Mar 20th)

Read the original article: YARA Pre-release v4.1.0, (Sat, Mar 20th) There's a new version of YARA on GitHub, a pre-release for version 4.1.0.   Become a supporter of IT Security News and help us remove the ads. Read the original…

Pastebin.com Used As a Simple C2 Channel, (Fri, Mar 19th)

Read the original article: Pastebin.com Used As a Simple C2 Channel, (Fri, Mar 19th) With the growing threat of ransomware attacks, they are other malicious activities that have less attention today but they remain active. Think about crypto-miners. Yes, attackers…

Simple Python Keylogger , (Thu, Mar 18th)

Read the original article: Simple Python Keylogger , (Thu, Mar 18th) A keylogger is one of the core features implemented by many malware to exfiltrate interesting data and learn about the victim. Besides the fact that interesting keystrokes can reveal…

Finding Metasploit & Cobalt Strike URLs, (Mon, Mar 15th)

Read the original article: Finding Metasploit & Cobalt Strike URLs, (Mon, Mar 15th) Metasploit and Cobalt Strike generate shellcode for http(s) shells. The URLs found in this shellcode have a path that consist of 4 random alphanumeric characters. But they…

Wireshark 3.4.4 Released, (Sun, Mar 14th)

Read the original article: Wireshark 3.4.4 Released, (Sun, Mar 14th) Wireshark version 3.4.4 was released.   Become a supporter of IT Security News and help us remove the ads. Read the original article: Wireshark 3.4.4 Released, (Sun, Mar 14th)

Microsoft DHCP Logs Shipped to ELK, (Fri, Mar 12th)

Read the original article: Microsoft DHCP Logs Shipped to ELK, (Fri, Mar 12th) This parser takes the logs from a Windows 2012R2 server (C:\Windows\System32\dhcp) and parses them into usable metatada which can be monitored via a dashboard. The logs have…

If you have an F5, it’s time to patch! Thanks Michele for the link to today’s crop of F5 CVE’s, which include an unauthenticated RCE against the API, and another RCE against “hidden” config pages! https://support.f5.com/csp/article/K02566623, (Wed, Mar 10th)

Read the original article: If you have an F5, it’s time to patch! Thanks Michele for the link to today’s crop of F5 CVE’s, which include an unauthenticated RCE against the API, and another RCE against “hidden” config pages! https://support.f5.com/csp/article/K02566623,…

Microsoft March 2021 Patch Tuesday, (Tue, Mar 9th)

Read the original article: Microsoft March 2021 Patch Tuesday, (Tue, Mar 9th) This month we got patches for 122 vulnerabilities. Of these, 14 are critical, 5 are being exploited and 2 were previously disclosed.   Become a supporter of…

YARA and CyberChef, (Mon, Mar 8th)

Read the original article: YARA and CyberChef, (Mon, Mar 8th) If you prefer a graphical user interface to match YARA rules, you can try CyberChef.   Become a supporter of IT Security News and help us remove the ads. Read…

PCAPs and Beacons, (Sun, Mar 7th)

Read the original article: PCAPs and Beacons, (Sun, Mar 7th) I like taking a closer look at captures files posted by Brad. In his latest diary entry, we have a capture file with Cobalt Strike traffic.   Become a supporter…

Spotting the Red Team on VirusTotal!, (Sat, Mar 6th)

Read the original article: Spotting the Red Team on VirusTotal!, (Sat, Mar 6th) Many security researchers like to use the VirusTotal platform. The provided services are amazing: You can immediately have a clear overview of the dangerousness level of a file but… VirusTotal…

Spam Farm Spotted in the Wild, (Fri, Mar 5th)

Read the original article: Spam Farm Spotted in the Wild, (Fri, Mar 5th) If there is a place where you can always find juicy information, it's your spam folder! Yes, I like spam and I don't delete my spam before…

Qakbot infection with Cobalt Strike, (Wed, Mar 3rd)

Read the original article: Qakbot infection with Cobalt Strike, (Wed, Mar 3rd) Introduction   Become a supporter of IT Security News and help us remove the ads. Read the original article: Qakbot infection with Cobalt Strike, (Wed, Mar 3rd)

Patch Now: HAFNIUM targeting Exchange Servers with 0day exploits https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/, (Tue, Mar 2nd)

Read the original article: Patch Now: HAFNIUM targeting Exchange Servers with 0day exploits https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/, (Tue, Mar 2nd) This post doesn’t have text content, please click on the link below to view the original article. Patch Now: HAFNIUM targeting Exchange Servers…

Adversary Simulation with Sim, (Tue, Mar 2nd)

Read the original article: Adversary Simulation with Sim, (Tue, Mar 2nd) One of the best ways to test your detection portfolio is to emulate user actions on monitored systems.   Become a supporter of IT Security News and help us…

Fun with DNS over TLS (DoT), (Mon, Mar 1st)

Read the original article: Fun with DNS over TLS (DoT), (Mon, Mar 1st) Going back a few weeks, we discussed how DNS over HTTPS (DoH) works (https://isc.sans.edu/forums/diary/Fun+with+NMAP+NSE+Scripts+and+DOH+DNS+over+HTTPS/27026/)  – very much as an unauthenticated API over HTTPS.  But DNS over TLS…

Maldocs: Protection Passwords, (Sun, Feb 28th)

Read the original article: Maldocs: Protection Passwords, (Sun, Feb 28th) In diary entry “Unprotecting Malicious Documents For Inspection” I explain how to deal with protected malicious Excel documents by removing the protection passwords.   Become a supporter of IT Security…

Forensicating Azure VMs, (Thu, Feb 25th)

Read the original article: Forensicating Azure VMs, (Thu, Feb 25th) With more and more workloads migrating to “the Cloud”, we see post-breach forensic investigations also increasingly moving from on-premises to remote instances. If we are lucky and the installation is…

DDE and oledump, (Sun, Feb 21st)

Read the original article: DDE and oledump, (Sun, Feb 21st) I was asked if the DDE YARA rules I created work with oledump.py on the sample that Xavier wrote about in his diary entry “Dynamic Data Exchange (DDE) is Back…

Dynamic Data Exchange (DDE) is Back in the Wild?, (Fri, Feb 19th)

Read the original article: Dynamic Data Exchange (DDE) is Back in the Wild?, (Fri, Feb 19th) DDE or “Dynamic Data Exchange” is a Microsoft technology for interprocess communication used in early versions of Windows and OS/2. DDE allows programs to manipulate objects provided by other programs,…

Malspam pushing Trickbot gtag rob13, (Wed, Feb 17th)

Read the original article: Malspam pushing Trickbot gtag rob13, (Wed, Feb 17th) Introduction   Become a supporter of IT Security News and help us remove the ads. Read the original article: Malspam pushing Trickbot gtag rob13, (Wed, Feb 17th)