Joe

1K posts

Joe banner
Joe

Joe

@trk_rdy

MSFT | My opinions are mine.

Katılım Mart 2021
466 Takip Edilen1.4K Takipçiler
Joe
Joe@trk_rdy·
GIF
ZXX
0
0
4
144
HotCakeX ✡︎ סגול
HotCakeX ✡︎ סגול@CyberCakeX·
After Months of Development, FINALLY ready to share: Harden System Security🎉 ✅ Complete System Hardening ✅ Security Posture Analysis ✅ All-in-One Toolkit ✅ Built-in Intune support for Scalability ✅ Beautiful Modern UI ✅ CLI support github.com/HotCakeX/Harde… #Cyber #Windows
English
30
162
990
145.2K
EZ
EZ@IAMERICAbooted·
Someone said today they are going to get MDE+AV installed along side 3rd party EDR+AV. Go ahead summer child. Go ahead. Don't listen to the people who already did this 5 years ago and know what problems it caused. But sure, have your fun thinking you know better.
English
12
5
94
23.6K
Joe retweetledi
Ru Campbell
Ru Campbell@rucam365·
New video: deep dive into Defender for Endpoint/Antivirus settings. - what every one really does - what “good” looks like - gotchas - nuances And why some of the important ones are “hidden”. Watch: youtu.be/R8btJ_SjwVk
YouTube video
YouTube
Ru Campbell tweet media
English
3
35
214
17K
Joe
Joe@trk_rdy·
@reprise_99 That’s and toys requiring 22 batteries and have no volume control.
English
0
0
1
132
Matt Zorich
Matt Zorich@reprise_99·
When another parent gifts your child a 10-dollar craft set from Kmart that has 10 million beads, one kg of glitter and 400 metres of thread that you will continue to find around your house until the end of time
GIF
English
2
0
12
1.2K
Joe
Joe@trk_rdy·
How’s the test system configured? Is my favorite unanswered question.
English
0
0
4
421
Joe
Joe@trk_rdy·
@Cyb3rMaddy How’s the test system configured?
English
0
0
0
283
Maddy 🐝
Maddy 🐝@Cyb3rMaddy·
🔥 BYPASS WINDOWS DEFENDER XOR-obfuscate a Sliver C2 payload on Kali, forge a stealth C++ loader, and drop a reverse shell on Win10 in seconds. OUT NOW: youtu.be/lC9zh3_S-zg
YouTube video
YouTube
Maddy 🐝 tweet media
English
22
253
1.9K
99.5K
Joe
Joe@trk_rdy·
@malmoeb This is another example of “how is the system configured?”
English
0
0
3
979
Stephan Berger
Stephan Berger@malmoeb·
I successfully tested a LSASS dumping technique on a Windows 10 lab machine, which we encountered on a recent Incident Response engagement (no EDR, default Defender installed). The "MiniDumpWriteDump" technique, as described here [1], was successful in writing the LSASS process to disk. However, as soon as I tried to copy the dump to my Kali machine, Defender jumped into action, prohibited access to the LSASS dump, and removed the file to the quarantine. And here is the catch. I browsed to the following folder: C:\ProgramData\Microsoft\Windows Defender\Quarantine In the ResourceData folder, you will find different sub-folders (or not, if Defender never quarantined something on that host), each folder containing a quarantine file. The files are encrypted with a static key that leaked years ago, and this 10-year-old code snippet is still sufficient to decrypt the files back to their original state. [2] Long story short: I copied the encrypted file to my Kali machine, decrypted it using the Python code from [2], and extracted the credentials and hashes with pypykatz. [3] Classic example of "No, it's not enough when your AV blocked or removed a threat". As you can see, an attacker can easily get the LSASS dump, even if Defender removed it from the disk ¯\_(ツ)_/¯ [1 ]ired.team/offensive-secu… [2] raw.githubusercontent.com/malmoeb/DFIR/r… [3] github.com/skelsec/pypyka…
Stephan Berger tweet media
English
4
81
332
30.8K
Nasreddine Bencherchali
Nasreddine Bencherchali@nas_bench·
If you claims you bypassed an EDR, please show us the Cloud connection status. If its "disconnected" -> See gif below. Also as a new standard, when you demo a bypass claim, do not show the desktop but instead show us the EDR UI an activity tab of the machine.
GIF
English
7
10
71
6.7K
Matt Zorich
Matt Zorich@reprise_99·
Hey @elonmusk can you use the power of this new US government to investigate this Lakers Mavs trade for us all? Thanks 🙏
English
1
0
10
2.1K
Douglas C
Douglas C@Do0g7e·
@DebugPrivilege you still got pals in MSFT? got an interesting submission MDE is missing...nice bundled cobalt strike, nitrogenloader with MSTeamsSetup.exe
English
1
0
0
70
Joe
Joe@trk_rdy·
@HuntressLabs FWIW - Disabling notifications doesn’t impair Defender
English
0
0
3
127
Huntress
Huntress@HuntressLabs·
🥓 Authenticated onto the VPN from a suspicious Eastern European IPv4 🧀 Checked the Domain Admins group and cleared Windows Event Logs 🌭 Then impaired Defender, deployed a reverse shell disguised as a legit binary, and set up a Tor service for persistent RDP access.
Huntress tweet mediaHuntress tweet mediaHuntress tweet media
English
3
1
67
3.2K
Huntress
Huntress@HuntressLabs·
A threat actor broke into a Wisconsin food factory’s network Our SOC saw every move they made 👇
English
6
17
206
32K
Joe
Joe@trk_rdy·
@reprise_99 Should say “IR” instead of water.
English
0
0
1
149
Matt Zorich
Matt Zorich@reprise_99·
Those health professionals were right after all, drinking two litres of water a day has given me much more energy
Matt Zorich tweet media
English
4
0
17
2.4K
Joe
Joe@trk_rdy·
@NathanMcNulty @YongRheeMSFT It’s the proactive perf part I’m not super familiar with as the last 4 years or so of IR work it was always ad-hoc, mixed tooling situations we needed to troubleshoot so we knew the machine and generally how to repo perf issues.
English
0
0
1
87
Nathan McNulty
Nathan McNulty@NathanMcNulty·
@trk_rdy @YongRheeMSFT Should always start with a clean slate... But there's no proactive performance reporting, so orgs bring exclusions over because "we don't wanna risk it..." Poor Yong Rhee has already worked with one of these, but hopefully I can save him a call next month on something else :p
English
1
0
0
161
Nathan McNulty
Nathan McNulty@NathanMcNulty·
OK, now we're cooking :) Will have to publish a blog on setup, but this is pretty awesome Done with the part to collect EstimatedImpact events from MPLog and send back to a Log Analytics Workspace in a way we can query Next is the performance analyzer output 😎
Nathan McNulty tweet media
Nathan McNulty@NathanMcNulty

In case anyone is interested, here's a script to gather Defender logs and create a performance recording, then compress it and upload it to Azure blob storage This works via Live Response, Intune scripts, etc. Just need Create permissions on a SAS token. github.com/nathanmcnulty/…

English
3
2
40
6K
Joe
Joe@trk_rdy·
@NathanMcNulty Oh boy haha, that’s usually the time to start with as clean of a slate as possible. @YongRheeMSFT and recommendations here? Seems like there would many variables to this. Let me ponder on this.
English
1
0
1
113
Nathan McNulty
Nathan McNulty@NathanMcNulty·
@trk_rdy Proactive performance monitoring :) Very long story short, I keep getting orgs that migrate a freaking mess of exclusions despite best efforts... So I want to create a simple solution where we can identify/correlate potential issues and help create contextual process exclusions
English
1
0
1
133
Joe
Joe@trk_rdy·
@NathanMcNulty Very interesting question, is this something you’d collect ad-hoc or based on an event?
English
1
0
1
90
Nathan McNulty
Nathan McNulty@NathanMcNulty·
Yo @trk_rdy, got any recs on combinations of EstimatedImpact and time for cutoffs on what to collect from MPLog? I'm thinking default of 70+ with over 1K total time for reasonable volume and things to chase down Thoughts? :)
English
1
0
0
971
Joe
Joe@trk_rdy·
@reprise_99 Haha, garage fridge is for beer and venison. Certainly not a rich thing in the Midwest. For me it was a dining room, kids whose parents brought the food into a whole other room to eat was wild.
English
1
0
4
222
Matt Zorich
Matt Zorich@reprise_99·
Growing up, what was the one thing you saw at someone else's house that you thought made them rich? For me, it was anyone that had an extra fridge in the garage just for drinks. I thought this was the height of wealth as a kid
English
14
0
23
3.8K