Kyle Eaton

621 posts

Kyle Eaton banner
Kyle Eaton

Kyle Eaton

@0xkyle

phishing, maldocs, threat intel

เข้าร่วม Mart 2015
344 กำลังติดตาม1K ผู้ติดตาม
Kyle Eaton
Kyle Eaton@0xkyle·
Look, backtrack is still cooler than kali
English
0
0
3
158
Kyle Eaton
Kyle Eaton@0xkyle·
@KyleTDavis1 You’ve always been a joy to work with, and have given me good advice related to work/cyber and anything else I’ve needed help with. I know you’ll thrive wherever you land next
GIF
English
0
0
1
59
A Beacon Of Wisdom In These Ignorant Times
I wasn't going to say anything about this on this site because I'm fine with it, but I got laid off today, and so many people have reached out with such kinds words, saying how I helped them or inspired them, offering to help, etc, I honestly just feel truly grateful.
English
4
0
6
149
Kyle Eaton
Kyle Eaton@0xkyle·
@j2k3k Interviewers when I, literally Neo in the matrix, runs ssh on a nonstandard port
GIF
English
1
0
8
463
Jake Knowlton
Jake Knowlton@j2k3k·
“what port does X use” who cares, google it, come up with better interview questions
English
78
23
898
288.9K
Kyle Eaton รีทวีตแล้ว
Threat Insight
Threat Insight@threatinsight·
Proofpoint threat researchers have designed an open-source tool—named PDF Object Hashing—to track and detect the unique characteristics of PDFs used by threat actors... similar to a digital fingerprint. 🫆 We use this tool internally to help track multiple threat actors with high confidence, improving attribution in many cases. The tool has been released in the @Proofpoint Emerging Threats public #GitHub for other defenders to leverage. Learn more about it here: brnw.ch/21wWSH0 @ET_Labs #PDF #threatdetection #cyberthreat
Threat Insight tweet media
English
0
43
160
15.5K
Kyle Eaton
Kyle Eaton@0xkyle·
Another great year at @GrrCON! Big props to the staff for all the hard work they do 🫶
English
1
0
7
251
Kyle Eaton
Kyle Eaton@0xkyle·
I’ll be presenting at @GrrCON this year about some weird pdf detection ideas I’ve been messing with. Swing by and tell me your file format
English
0
1
5
408
Kyle Eaton
Kyle Eaton@0xkyle·
@ex_raritas It’s been really nice working with you, and good luck in your next role! 🐜
English
1
0
2
240
Andrew Northern 𓅓
Andrew Northern 𓅓@ex_raritas·
Tomorrow (Friday) will be my last day at Proofpoint after four years on the Threat Research team. Over that time, I’ve been fortunate to advance research into evolving malware, track infrastructure, uncover adversary techniques, and help shape how threats are understood and countered. I’m grateful for the opportunity, but more so the privilege of working alongside such talented and dedicated peers. I’ll share more soon about what comes next. 😊💻🧑‍💻
English
8
1
65
5K
Malware Utkonos
Malware Utkonos@MalwareUtkonos·
@0xkyle @greglesnewich Yes, that's the goal. I was getting end locators that belonged to subfiles. Another benefit that I didn't expect, but is logical is that Zip rules can find those executables that use a Zip archive as the overlay if you're using end locator rather than PK magic at offset 0
English
1
0
3
47
Greg Lesnewich
Greg Lesnewich@greglesnewich·
the biggest skill jump I took with yara was to think how the bytes within a file relate to one another Malware isn’t a monolith - it’s a composite of bytes, and those bytes have to work together to do their job. we can exploit those unique relations to track em
English
5
9
89
5.5K
Kyle Eaton
Kyle Eaton@0xkyle·
@MalwareUtkonos @greglesnewich I do really like that you’re using the filesize in part of the location check like that, I don’t know if I have any rules that use the filesize in that way.
English
0
0
2
29
Kyle Eaton
Kyle Eaton@0xkyle·
@MalwareUtkonos @greglesnewich Am I right in assuming that’s meant to make sure you’re only reading the eocd of the actual zip file and not any of the sub files? I have some rules where I’ve done something similar, I think it went something like: uint32be(@eocd[#eocd] + whatever) == 0xdeadbeef
English
2
0
3
68
Kyle Eaton
Kyle Eaton@0xkyle·
@greglesnewich @MalwareUtkonos Definitely have to echo how impactful learning file formats was for improving my yara rules. How highly structured the Zip format is makes rules very fun. The only sample rule I have rn is this old compression ratio one
Kyle Eaton tweet media
English
1
1
6
259
Kyle Eaton
Kyle Eaton@0xkyle·
The PDF spec is where the phrase “bless this mess” originated.
English
0
0
4
211
Kyle Eaton รีทวีตแล้ว
Proofpoint
Proofpoint@proofpoint·
On this DISCARDED episode, we uncover real-world detection wins, explore persistent threats like #TA505 and #Emotet, and dive into the importance of instincts in cybersecurity—because, as our guest puts it, sometimes good detection is all about the vibes. brnw.ch/21wQWWl
Proofpoint tweet media
English
0
5
12
2K
Kyle Eaton
Kyle Eaton@0xkyle·
Haven’t seen PDFs yet but new domain popped up: defenceindia[.]link
English
0
0
1
403
Kyle Eaton
Kyle Eaton@0xkyle·
departmentofdefence[.]link 🧐 Probably see PDFs using this soon
English
1
0
2
265
A Beacon Of Wisdom In These Ignorant Times
One time when I was in a government building. Me: Can I use this phone quick? Somebody: Yes, but do NOT push the buttons that say China or Russia. Me: What would happen? Somebody: Um, it would call China or Russia. Me: You mean like Zhongnanhai or the Kremlin? Somebody: Yes. Me:
GIF
English
2
0
1
157
Kyle Eaton
Kyle Eaton@0xkyle·
ministryofdefenceindia[.]link does not pass the sniff test.
English
0
0
4
520