James D

388 posts

James D banner
James D

James D

@FranticTyping

Threat Hunting | Detection Engineering | Defensive Automation (ex @Countercept, @mwrlabs)

Katılım Nisan 2008
448 Takip Edilen845 Takipçiler
Sabitlenmiş Tweet
James D
James D@FranticTyping·
I'm happy to announce the release of Chainsaw v2! 🥳 Chainsaw allows users to rapidly search through Windows event logs and hunt for threats using @sigma_hq detection rules, all without a SIEM! Version 2 includes some exciting new features, info in 🧵 github.com/WithSecureLabs…
English
13
235
660
0
James D
James D@FranticTyping·
@__invictus_ @RedTeamTactics PPID spoofing was the gift that kept giving a few years ago. Threat actors were doing it without realising it was a very high fidelity detection for most EDRs. It so rarely happens normally that it was a dead giveaway something malicious was going on blog.f-secure.com/detecting-pare…
English
1
0
4
149
Tim
Tim@__invictus_·
@RedTeamTactics Ppid spoofing is mega easy to spot, afaik pretty much every EDR will detect that trivially. Friends don't let friends ppid spoof
English
1
0
7
275
Chris Harrod
Chris Harrod@thechrisharrod·
Pretty exciting career announcement. As of Monday, I'll be a Government employee as the Manager of Security Operations at the United States House of Representatives.
English
18
2
142
14.4K
AngusRed is #Hiring
AngusRed is #Hiring@AngusRedBlue·
Anyone have a spare ticket to @BSidesLondon? Have a Veteran I am trying to help get a ticket to BSides. Man has saved lives (Medic), lets see if we can help him? Thanks in advance!
English
6
6
9
3.8K
James D
James D@FranticTyping·
Scaling detection and response operations at Coinbase part 2 & 3: 🔍 Driving context into detection logic with machine and user profiles 🔧 Codifying automatic remediation for high-risk detections 📫 Automating alert triage with employees via Slackbot coinbase.com/blog/scaling-d…
English
1
31
79
8.9K
James D
James D@FranticTyping·
The first part of my blog series on how we’ve been scaling detection and response operations at Coinbase is live! Interested in speeding up your investigations, increasing the visibility of key data sources, and improving quality of life for analysts? coinbase.com/blog/scaling-d…
English
3
22
122
11.4K
James D retweetledi
mark
mark@magerbomb·
Our team at @elastic has been developing this feature for almost six years and we are excited to share our work with the security research community. Thanks to @GabrielLandau @joehowwolf and many others who have contributed to this effort over the years!
Elastic@elastic

Elastic Security makes our ransomware protection artifact open! Learn more here about our commitment to openness and transparency and how detection capabilities need to evolve to keep pace with ransomware threats: go.es.io/3IiBFkd

English
0
7
29
3.9K
James D retweetledi
Dray Agha
Dray Agha@Purp1eW0lf·
Dude, you can wipe whatever WEVTXs you want 🪠 @HuntressLabs gon' find the user accounts, session times, machines, and method for your lateral movement 🕵️‍♀️ You'd be surprised what #RDP-related event logs can reveal ponderthebits.com/2018/02/window…
Dray Agha tweet mediaDray Agha tweet mediaDray Agha tweet media
English
1
27
79
19.3K
James D
James D@FranticTyping·
@visibil1 @sigma_hq Hey! That requirement isn’t available within chainsaw and would need to be handled within the rule logic. If you find problematic rules you can either disable them or alter them to exclude ParentProcessName as you need. I hope that helps!
English
0
0
0
0
INFOSEC_Visibility
INFOSEC_Visibility@visibil1·
@FranticTyping @sigma_hq Is there an exclusionary capability with Chainsaw v2.0? For instance, the ability to exempt certain ParentProcessName values from generating output results?
English
1
0
0
0
James D
James D@FranticTyping·
I'm happy to announce the release of Chainsaw v2! 🥳 Chainsaw allows users to rapidly search through Windows event logs and hunt for threats using @sigma_hq detection rules, all without a SIEM! Version 2 includes some exciting new features, info in 🧵 github.com/WithSecureLabs…
English
13
235
660
0
James D
James D@FranticTyping·
Also, a massive shout out to @AlexKornitzer for all of his work on v2. He managed to take my “lockdown 2020 Christmas project” and turn it into a much more polished solution. ❤️
English
1
0
13
0
James D
James D@FranticTyping·
v2 highlights💡 📖 Support for event logs in XML and JSON format 🎯 Increased sigma rule logic support. More detections! 📘 Chainsaw output displays important information more clearly 🔎 Better filtering/searching options 🦖 Updated Velociraptor Plugin bit.ly/3woOaFz
James D tweet media
English
4
2
17
0
James D
James D@FranticTyping·
@Purp1eW0lf @AlexKornitzer Ah, that's so cool to see Chainsaw being useful!😀 We've just released the beta of Chainsaw v2 which contains a lot of improvements over v1 (support for loading EVTX in JSON & XML format, better sigma detection coverage, faster execution etc). I'd love to hear your feedback!
English
1
1
4
0
Dray Agha
Dray Agha@Purp1eW0lf·
To get all of these in a grepable file, collect the relevant EVTXs, then run Chainsaw in search mode, for either a string or EventID, or pivot between the two iteratively Chainsaw is @FranticTyping and @AlexKornitzer's awesome tool for investigating EVTXs github.com/countercept/ch…
Dray Agha tweet mediaDray Agha tweet mediaDray Agha tweet media
English
1
4
16
0
Dray Agha
Dray Agha@Purp1eW0lf·
Take a look at the IPs in your 4625s (failed logins) on external perimeter servers Then compare these IPs in your 4624s (successful logins). Have any been successful? Take the successful IPs, expand the 4624 search results to identify the time, logon type, and user account
Dray Agha tweet mediaDray Agha tweet mediaDray Agha tweet media
English
2
9
61
0
James D
James D@FranticTyping·
Really cool to see this tool finally public! If you’re still viewing alert data in a jira ticket, I’d recommend checking out the approach DetectTree takes to visualise detections, it makes a massive difference.
WithSecure™@WithSecure

Happy to drop this new open-source tool that connects the dots during a cyber attack to help blue teams cut down response times, avoid alert fatigue, and communicate during an incident. More info here >> labs.withsecure.com/tools/detectree #cybersecurity #incidents #infosec

English
1
1
6
0
James D retweetledi
Jared Atkinson
Jared Atkinson@jaredcatkinson·
Check out the first post in my new blog series "On Detection: From Tactical to Functional". The first post explores how we can leverage source code to discover which API Functions an attack tool is using which serves as a base for further investigation. posts.specterops.io/on-detection-t…
English
2
83
185
0