LetsDefend

3.2K posts

LetsDefend banner
LetsDefend

LetsDefend

@LetsDefendIO

LetsDefend, now part of Hack The Box. Read more: https://t.co/jxMnGZ4Yne

Cloud Katılım Temmuz 2020
1 Takip Edilen139.6K Takipçiler
LetsDefend
LetsDefend@LetsDefendIO·
⚠️ New SOC Alert: SyncAppvPublishingServer Execution to Bypass PowerShell Restriction Attackers use SyncAppvPublishingServer.vbs (a legit Microsoft-signed script) to proxy PowerShell commands via wscript.exe, bypassing execution policy restrictions. This "living off the land" technique evades defenses by mimicking trusted system behavior. 👥 Role: Incident Responder 🛠️ Type: Persistence 💪 Difficulty: Medium 🔢 Event ID: 294
LetsDefend tweet media
English
0
10
38
3.6K
LetsDefend
LetsDefend@LetsDefendIO·
During investigating an SIEM alert
LetsDefend tweet media
Indonesia
1
11
111
3.5K
LetsDefend
LetsDefend@LetsDefendIO·
🤩 New Learning Path!!!!! You'll be ready to get a new certificate!
LetsDefend tweet media
English
0
1
7
1.5K
LetsDefend
LetsDefend@LetsDefendIO·
Expectations...
English
0
6
72
5K
LetsDefend
LetsDefend@LetsDefendIO·
⚠️ New Challenge!
LetsDefend tweet media
English
0
2
21
2K
LetsDefend
LetsDefend@LetsDefendIO·
⚠️ New SOC Alert: Suspicious Certificate Management Activity Detected Attackers use suspicious certificate management to exploit misconfigured AD CS templates, requesting certs with elevated privileges (e.g., ESC1). This enables Kerberos auth as admins for lateral movement & persistence, evading password-based detection. 👥 Role: Incident Responder 🛠️ Type: C2 💪 Difficulty: High 🔢 Event ID: 293
LetsDefend tweet media
English
0
7
28
3.3K
LetsDefend
LetsDefend@LetsDefendIO·
Malware analyst.
LetsDefend tweet media
English
4
9
150
4.8K
LetsDefend
LetsDefend@LetsDefendIO·
Linux vs Windows
LetsDefend tweet media
English
31
106
1.2K
19.9K
LetsDefend
LetsDefend@LetsDefendIO·
Notepad
LetsDefend tweet media
English
18
161
2.2K
70K
LetsDefend
LetsDefend@LetsDefendIO·
Email Verification Records
LetsDefend tweet media
Français
3
26
162
7K
LetsDefend
LetsDefend@LetsDefendIO·
⚠️ New Course: Threat Intelligence Reports Learn how to effectively create and analyze threat intelligence reports with this comprehensive course for SOC managers.
LetsDefend tweet media
English
1
4
23
2.2K
LetsDefend
LetsDefend@LetsDefendIO·
Cybersecurity life
LetsDefend tweet media
English
3
38
425
9.2K
LetsDefend
LetsDefend@LetsDefendIO·
⚠️ New Challenge: Silent Drain
LetsDefend tweet media
English
0
2
12
3K
LetsDefend
LetsDefend@LetsDefendIO·
SOC Team
LetsDefend tweet media
English
2
23
204
6.5K
LetsDefend
LetsDefend@LetsDefendIO·
⚠️ Unauthorized Template Modification Detected Attackers use “Unauthorized Template Modification Detected”‑style techniques to inject malicious code or references into document or certificate templates so that payloads are fetched or executed only when a user opens a file, bypassing static scanners and enabling stealthy persistence or privilege escalation. 👥 Role: Incident Responder 🛠️ Type: C2 💪 Difficulty: High 🔢 Event ID: 290
LetsDefend tweet media
English
0
2
27
3.1K
LetsDefend
LetsDefend@LetsDefendIO·
Linux commands
LetsDefend tweet media
English
0
80
364
9.6K
LetsDefend
LetsDefend@LetsDefendIO·
⚠️ New Course: Threat Intelligence Feeds and Platforms
LetsDefend tweet media
English
0
3
29
2.2K
LetsDefend
LetsDefend@LetsDefendIO·
Spyware
GIF
1
21
74
3.3K
LetsDefend
LetsDefend@LetsDefendIO·
Being a SOC Analyst
LetsDefend tweet media
English
6
53
509
13.7K