Karsten Hahn

9.4K posts

Karsten Hahn banner
Karsten Hahn

Karsten Hahn

@struppigel

MalwareAnalysisForHedgehogs, Principal Malware Researcher at GDATA, he/him 🦔🌈🏳️‍⚧️

International Katılım Mayıs 2014
787 Takip Edilen25.6K Takipçiler
vx-underground
vx-underground@vxunderground·
tl;dr normie to big stinky nerd translator I'm going to share something embarrassing, but this is true. I have found a good usage of AI (for me, at least). I'm a big stinky nerd and I have a hard time understanding what people are saying to me. I am an extremely explicit communicator. I usually say exactly what I mean (for better or worse). I get very confused when people imply something, or lean heavily on emotional phrasing, to implicitly communicate. I have been unironically using AI to explain what people are saying to me. I'll detail the conversation to the best of my ability if it was communicated verbally, if it was online I copy-paste my message and the persons response (or comment). The silly AI slop robot then translates what the person says into explicit communication for me so I understand better. Basically, the dumb ass slop machine robot is better at understanding humans than me. Sometimes I have zero idea what someone is talking about or trying to convey. pic related: machine deciphering human language and explaining to my dumb nerd brain
vx-underground tweet media
English
47
17
830
29.9K
Karsten Hahn retweetledi
Kostas
Kostas@Kostastsale·
Today I’m launching Threat Hunting Labs. Over the years I’ve analyzed many real-world intrusions. One thing became obvious: most training platforms don’t resemble how investigations actually happen. So I built something different. Threat Hunting Labs focuses on investigation-driven learning using real telemetry and structured investigative paths. If you want to get better at investigating breaches, you should practice investigating breaches. More details here: threathuntinglabs.com/blog/introduci…
English
21
115
588
44.5K
Karsten Hahn
Karsten Hahn@struppigel·
@RussianPanda9xx Wrinkles that were deepened from smiling a lot during your life are a very charismatic feature and interesting to look at. I have a deep "third eye" / brooding wrinkle between my eyebrows, not sure if I am happy about it, but it's accurate.
English
1
0
7
498
Karsten Hahn retweetledi
vx-underground
vx-underground@vxunderground·
I am genuinely impressed by mainstream media outlets ability to find absolute nobodies in cybersecurity. It's remarkable. I am often left speechless. There has been dozens occasions, especially as of recent, where some media outlet will be like, "Today as a special guest is world-renowned cybersecurity expert and ethical hacker Joe McCyberSecurity". I'm like, who the fuck is Joe McCybersecurity? I've been doing cybersecurity and malware stuff for a long time and I've never once seen or heard of Joe McCybersecurity. If he is world-renowned, I would THINK I would have seen them or heard of them. The camera then pans over to Joe McCybersecurity and it is the most generic cookie cutter white dude in a cheap suit and the tag below him will say something like, "Joe McCybersecurity, Ethical Hacker, CEO of Cybersecurity McJoe Industries" I'm like, "Cybersecurity McJoe Industries? What the fuck is that?". I look it up and it's a generic WordPress website hosted on GoDaddy with an expired SSL cert. Joe McCybersecurity then babbles incomprehensible nonsense for about 60 seconds until the TV host goes "woaw" and it cuts to a commercial. Absolute cinema.
English
118
150
2.4K
88K
Chris Sanders 🔎 🧠
Chris Sanders 🔎 🧠@chrissanders88·
Investigation Scenario 🔎 Browser history for an HR user shows repeated visits to chat.openai[.]com, followed by creation of C:\Users\chris\AppData\Local\Temp\cleanup[.]ps1. The file is not available, and the hash shows no matches in OSINT resources. What do you look for to investigate whether an incident occurred? #InvestigationPath #DFIR #SOC
English
12
11
86
17.7K
Jesko Hüttenhain
Jesko Hüttenhain@huettenhain·
A lot of convenience added to #BinaryRefinery in 0.10.2 overall, so this might be a good time to update. Hey @greglesnewich, remember when you wanted DMG archive support? Guess what ...
Jesko Hüttenhain tweet media
English
2
11
28
2.5K
Karsten Hahn
Karsten Hahn@struppigel·
@seongsu_kang Raw binaries, but I don't feed it a lot of samples at once. I use it only for single cases to figure out as much as possible about them.
English
0
0
1
138
seongsu
seongsu@seongsu_kang·
Nice setup. I work on blockchain investigation tools and we recently plugged MCP into our analysis pipeline — AI traces fund flows and generates reports automatically. Curious about the Remnux + LLM combo. Are you feeding raw binary samples or pre-processed indicators? 16GB RAM feels tight for embedding models.
English
1
0
1
213
Gootloader
Gootloader@Gootloader·
@struppigel But the zip manipulation Gootloader does to zips, that only extract a .JS on Windows but a .TXT fo everyone else, is a “feature” not a security flaw
English
1
0
1
169
Karsten Hahn
Karsten Hahn@struppigel·
@CyberRaiju @bohansec Yes, I agree and I also do this. VT is a very helpful tool to determine **potentially** undetected malware. I just don't like the AV bashing that often comes along with it. I created so many signatures that cannot show up on VT.
English
1
0
4
370
Jai Minton
Jai Minton@CyberRaiju·
@struppigel @bohansec Yeah, I do think it's important to call out binaries when they're undetected on VT, e.g. also no Yara hits. Not so much to say AV isn't detecting it, but more so to get eyes on it from vendors as the engines on VT used and behaviours exhibited means it's flying under the radar.
English
1
0
4
364
Karsten Hahn
Karsten Hahn@struppigel·
I have said this quite a few times, but there is this misconception that the scanning engines on VT tell you whether the AV product detects the malware. They do not.
English
6
13
111
34.3K
Malcat dev
Malcat dev@malcat4ever·
@struppigel Wait 'til they learn about password-protected zip files.
English
1
0
8
353