David Pany

848 posts

David Pany

David Pany

@DavidPany

Interested in the cyber.

Katılım Şubat 2011
175 Takip Edilen956 Takipçiler
David Pany
David Pany@DavidPany·
Is it weird that it’s a well known faux pas to roll your own crypto, but every website has been rolling their own identity with password policies, hashing, salting, storing, mfa, etc. for many years? Recent advances in “log on with” providers must be relief for devs.
English
0
0
0
173
Gigs @ Shmoo
Gigs @ Shmoo@Gigs_Security·
I find so much joy in making excel templates and you’ll never be able to take that from me.
GIF
English
1
0
6
683
Nick Carr
Nick Carr@ItsReallyNick·
@derekcoulson @3dRailForensics @MicrosoftTeams I blame all the Mandiant people in this old thread for encouraging Skype-style emoji in the first place 😉: (also that thread is about M’s old solution HipChat, which had no text formatting, limited edits w/ sed, couldn’t customize link behavior, … we’ve all come a long way!)
David Pany@DavidPany

@hiddenillusion @ItsReallyNick @Skype 's new seasonal emojis are a big hit though thanks to @jjayttaylor

English
3
1
3
0
David Pany
David Pany@DavidPany·
I just made a vector graphic and I liked it. Please don’t tell MS Paint. I’ll tell it via text when I’m ready.
GIF
English
0
0
1
0
David Pany
David Pany@DavidPany·
Anyone know if Sysmon EID 9 RawAccessRead can record the target file being accessed? I only see the process doing the access (less useful if injected) and the Device being accessed (how is that useful?). Not seeing answers in docs/blogs/etc. #DFIR
David Pany tweet media
English
2
1
3
0
David Pany
David Pany@DavidPany·
@jamieantisocial That makes a lot of sense! I assume if it were simple to record the data runs accessed and map that back to file path with the $MFT then @Sysinternals would have baked that in to Sysmon already. Maybe we can dream though?
GIF
English
1
0
1
0
J⩜⃝mie Williams
J⩜⃝mie Williams@jamieantisocial·
@DavidPany I might be wrong here, but I don't think this is possible because the read is just targeting the byte offsets of the drive where the file(s) exist
English
1
0
0
0
David Pany
David Pany@DavidPany·
@inversecos Such a good artifact! In case you have the full image and haven't already tried this, point this usn jrnl record carver at the whole thing and parse the output with your preferred $J parser. It's amazing what has turned up in unallocated journal records: github.com/PoorBillionair…
English
0
1
1
0
inversecos
inversecos@inversecos·
2\ The change journal basically tracks all changes made to files on a file system including deletion. The operation to look for is “FileDelete”. There are many tools to do this.
English
2
2
31
0
inversecos
inversecos@inversecos·
1\ How do you prove a TA deleted a file and when?
 Most threat actors including #APT groups perform file deletion. This can be very important to an investigation. If the client has no EDR/SIEM and has an OT legacy environment.. what do you do? Parse the $J file 😇 #DFIR
inversecos tweet media
English
12
80
291
0