LetsDefend
3.2K posts

LetsDefend
@LetsDefendIO
LetsDefend, now part of Hack The Box. Read more: https://t.co/jxMnGZ4Yne
Cloud Katılım Temmuz 2020
1 Takip Edilen139.6K Takipçiler

⚠️ New SOC Alert: SyncAppvPublishingServer Execution to Bypass PowerShell Restriction
Attackers use SyncAppvPublishingServer.vbs (a legit Microsoft-signed script) to proxy PowerShell commands via wscript.exe, bypassing execution policy restrictions. This "living off the land" technique evades defenses by mimicking trusted system behavior.
👥 Role: Incident Responder
🛠️ Type: Persistence
💪 Difficulty: Medium
🔢 Event ID: 294

English

⚠️ New SOC Alert: Suspicious Certificate Management Activity Detected
Attackers use suspicious certificate management to exploit misconfigured AD CS templates, requesting certs with elevated privileges (e.g., ESC1). This enables Kerberos auth as admins for lateral movement & persistence, evading password-based detection.
👥 Role: Incident Responder
🛠️ Type: C2
💪 Difficulty: High
🔢 Event ID: 293

English

⚠️ Unauthorized Template Modification Detected
Attackers use “Unauthorized Template Modification Detected”‑style techniques to inject malicious code or references into document or certificate templates so that payloads are fetched or executed only when a user opens a file, bypassing static scanners and enabling stealthy persistence or privilege escalation.
👥 Role: Incident Responder
🛠️ Type: C2
💪 Difficulty: High
🔢 Event ID: 290

English














