Andre Pawlowski

1.3K posts

Andre Pawlowski banner
Andre Pawlowski

Andre Pawlowski

@sqall01

IT-security enthusiast. Maker. Member of @FluxFingers. Author of https://t.co/85TIT9L82u

Somewhere around my laptop. Katılım Ocak 2010
70 Takip Edilen655 Takipçiler
Andre Pawlowski retweetledi
Andre Pawlowski
Andre Pawlowski@sqall01·
Does anyone know a good resource to get detailed Linux malware reports (the behavior of the Linux malware on the host)? Any source I know focuses on Windows and just "googling" it gives me a lot of superficial (news) reports
English
2
0
0
194
Jason Lang
Jason Lang@curi0usJack·
I enjoy giving and watching presentations, and I pay close attention to the attributes of the ones I think are really good talks. My personal acronym for what makes a great technical talk is SPEED. If you want to improve your presentation game, this is for you. 🧵
English
7
47
221
74.6K
Andre Pawlowski
Andre Pawlowski@sqall01·
TIL: if you are searching for suspicious processes on a Linux host by looking if the /proc/<pid>/exe points to a deleted file, it can point to "/ (deleted)". Apperently the Linux kernel also spawns processes: uninformativ.de/blog/postings/…
English
0
0
0
112
Andre Pawlowski retweetledi
Craig Rowland - Agentless Linux Security
Here is a quick way to find tainted Linux kernel modules that are not maliciously hiding: cat /proc/modules | grep \(.*\) Sample "malicious_module" is both out-of-tree and unsigned which would warrant a closer look.
Craig Rowland - Agentless Linux Security tweet media
English
2
37
128
20.6K
Andre Pawlowski
Andre Pawlowski@sqall01·
@CraigHRowland A generalized "firewall" device for sure. However, if the manufacturer of the medical device would adopt this infrastructure setting and build the "firewall" themselves and place them in front of their medical devices as the infrastructure setup, it would be easier.
English
0
0
0
3
Craig Rowland - Agentless Linux Security
I have joked for years that in my nightmares I wake after an auto accident and look over to see my morphine drip has a Wifi enabled sticker on it. Reality is that medical devices can often not get updated or face FDA certification issues. There is a chicken and egg scenario.
Frank McGovern - INACTIVE@FrankMcG

You’re absolutely a bad person if you run any technology in public that disturbs things like medical equipment. However, I feel like we’re focusing solely on the bad person and not enough or at all on the manufacturers that have their devices so insecure that this even works.

English
2
1
14
3K
Andre Pawlowski
Andre Pawlowski@sqall01·
@CraigHRowland I have heard of research in the field that tried to place some kind of gateway before the network connection of the medical device as a "firewall" kind of thing. So you can still upgrade the "firewall" without breaking your FDA certification. But this was years ago...
English
1
0
1
25
Craig Rowland - Agentless Linux Security
You get medical gear FDA certified to perform as expected. They want that software version to be the same because that's how it was tested. And really I get it. I don't want hotfixes being tossed onto the X-ray gear willy nilly. How to thread the needle?
English
1
0
3
453
Andre Pawlowski
Andre Pawlowski@sqall01·
What are linux process environment variables you should take a closer look into if you find them for processes on your system? I currently have in mind: - HISTFILE (=/dev/null) - HISTSIZE/HISTFILESIZE (=0) - LD_PRELOAD - SOCAT_* - SSH_C* (if ppid=1 => left-over process)
English
2
0
2
293
Andre Pawlowski
Andre Pawlowski@sqall01·
It is back. Contribute if you can to this nice project. And good to see that @gynvael's health is up for doing side projects again :)
Hussein Muhaisen@husseinmuhaisen

Come contribute an article to @pagedout_zine Issue #3 is in the making. Stumbled upon something cool during your cybersecurity adventure? Nice! write a 1 pager about it. Any questions -- reply below 👇 More information regarding article submission: pagedout.institute/?page=writing.…

English
0
0
3
825
Andre Pawlowski
Andre Pawlowski@sqall01·
@LiveOverflow Can you paste the link to the video with these comments? I am curious what kind of video it is.
English
1
0
0
424
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
I very very rarely receive negative comments. But release one German video, and get the love of my neighbors 💏
LiveOverflow 🔴 tweet mediaLiveOverflow 🔴 tweet mediaLiveOverflow 🔴 tweet media
English
31
0
193
33.5K
Andre Pawlowski retweetledi
Giuseppe `N3mes1s`
Giuseppe `N3mes1s`@N3mes1s·
Pitfalls of relying on eBPF for security monitoring (and some solutions) from ⁦@trailofbits⁩ Very nice overview and production problem you could encountered creating a security solution based on ebpf. And even some bypass 😁 blog.trailofbits.com/2023/09/25/pit…
English
0
13
31
3.6K
Andre Pawlowski
Andre Pawlowski@sqall01·
@SandflySecurity I found it actually quite hard to do so without console commands. I wrote something in C# and got the file size directly (FileInfo) and read the whole file and counted bytes (File.ReadAllText). Result was: C# could read the file with the data hidden by reptile 🤷‍♀️
English
1
0
1
31
Sandfly Security
Sandfly Security@SandflySecurity·
Sandfly easily de-cloaks Reptile and other stealth rootkits on Linux. Our free version will find these problems instantly without loading endpoint agents on your Linux fleet. Get a free license today at our website.
Sandfly Security tweet media
Craig Rowland - Agentless Linux Security@CraigHRowland

Here's how to use simple Linux command line tools to investigate and de-cloak Reptile stealth rootkit and others like it. grep . /etc/modules dd count=10000 bs=1 if=/etc/modules 2>/dev/null cat /etc/modules | wc -c

English
1
2
5
2K
Andre Pawlowski retweetledi
Craig Rowland - Agentless Linux Security
Finally, check that the kernel and filesystem byte counts match. Feeding the file through a simple "wc -c" command will count the bytes the filesystem thinks is present. If these values don't match, something is hiding. cat /etc/modules | wc -c
Craig Rowland - Agentless Linux Security tweet media
English
1
8
25
2.1K
Andre Pawlowski retweetledi
Jose Enrique Hernandez
Jose Enrique Hernandez@_josehelps·
Hey, infosec brains trust! 🧠 Ever felt like you're juggling digital chainsaws? 🪚💻 I've been in the trenches with: 🔹#LOLBAS 🛠️: Your multi-tool for Windows. A treasure trove of Binaries, Scripts, and Libraries that adversaries may use to live off your land. 🔹#GTFOBINS ⚙️: Your field guide to Unix binaries, masterfully navigating through airtight local security restrictions. 🔹#LOLDRIVERS 🚀: A rogues' gallery of Windows drivers, exploited by adversaries to bypass security controls and wreak havoc. These projects are more than just a catalog for abuses of the OS; they're a rich wellspring of intel and detection enrichment. 📚🔍 I'm curious, have you spun these into threat detection tools (sigma rules) or defenses? How did you automate the data collection process from these projects? The million-dollar question 💰: Have you rolled up your sleeves and used all the LOL resources in lolol.farm by @br0k3ns0und, or just cherry-picked a few? 🔄🔒 #DefenseDIY #InfoSecJugglers #LOLBinLife
Jose Enrique Hernandez tweet media
English
6
142
385
54.6K