390 Followers
55 Following
223 Posts

#DFIR #BlueTeam
Github: https://github.com/00010111
Not representing my employer (past & present).

tootfinder

Debugging - WinDBG & WinDBGX Fundamentals by @corelanc0d3r.bsky.social
https://www.corelan.be/index.php/2026/03/23/debugging-windbg-windbgx-fundamentals/
Debugging - WinDBG & WinDBGX Fundamentals - Corelan | Exploit Development & Vulnerability Research

Learn how to leverage WinDBG & WinDBGX for effective debugging. Essential tutorial for exploit development and analysis.

Corelan | Exploit Development & Vulnerability Research

I created a blog post on the NVISO blog, to share some observations we made in a recent incident dealing with Ivanti Endpoint Manager (EPMM), CVE-2026-1281, CVE-2026-1340 and not so sleepy 'sleeper shells'.
https://blog.nviso.eu/2026/03/13/ivanti-epmm-sleeper-shells-not-so-sleepy/

#BlueTeam #IncidentResponse #SharingIsCaring

Exploitation of CVE-2026-1281 & CVE-2026-1340 Ivanti EPMM Sleeper Shells

Exploitation of CVE-2026-1281 & CVE-2026-1340 in Ivanti EPMM - ‘Sleeper Shells’ not so sleepy?

NVISO Labs

I’ve been discussing patch/vulnerability management more often than usual lately. Here’s some food for thought I shared:

Not only recent examples have shown how quickly attackers turn fresh patches into mass exploitation. They’re not waiting 1–2 weeks while we run through test → stage → prod. Even with good reasons to test first, that timeline can be too slow for certain vulnerabilities.
We still need testing - and let’s be honest, the organization isn’t idle or excited about the next change to test - so the process won’t speed up.

The scope of patch/vulnerability management processes needs to expand: It doesn’t end when the patch is successfully applied. It needs to assess for each vulnerability:
 - Is this a trivial remote code execution on an network-edge device?
 - Or a niche, complex bug on an isolated system?

If it looks like the first case, plan for a compromise assessment alongside the patch rollout. Assume attackers may have moved faster than your change window.

And because reality often doesn’t give us perfect intel on day one, include structured follow-up, for example track emerging IOCs, exploit details, and vendor/community guidance post-release. This can tell you what to look for as signs of compromise or exploitation.

Bottom line: Let’s make the decision - whether and how deep to run a compromise assessment, plus the follow-up a formal part of patch/vulnerability management, and adapt the process where needed. For sure it won’t be easy, and it won’t fit every vuln on every asset. But the alternative might be a fully patched, yet compromised device that a simple check might have caught.

#PatchManagement #VulnerabilityManagement

"Linux Notes: ls and Timestamps"
Some nice hints in there to ease usage of ls.
#linux
https://righteousit.com/2026/03/06/linux-notes-ls-and-timestamps/
Linux Notes: ls and Timestamps

Confused about timestamp options and output with the Linux ls command? Here are some of my favorite tips!

Righteous IT
#stayinvictus #cloudincidentresponse #google #gws | Invictus Incident Response

We have had some questions asked around our Google Cloud/Workspace IR training and excited to share with you that we're making good progress. Keep following this page for updates and the official release date! In the meantime a 'little' overview of Google Workspace Audit logging. Let us know in the comments which log is in your Top 3 for Incident Response #stayInvictus #CloudIncidentResponse #Google #GWS

"Trust Me, I’m a Shortcut", nice blog about windows .LNK files. https://www.wietzebeukema.nl/blog/trust-me-im-a-shortcut #DFIR #Blueteam
Trust Me, I’m a Shortcut

Windows’ primary mechanism for shortcuts, LNK files, is frequently abused by threat actors for payload delivery and persistence. This blog post introduces several new LNK file flaws that, amongst other things, allow attackers to fully spoof an LNK’s target. It also introduces lnk-it-up, a tool suite that can generate such deceptive LNK files, as well as detect anomalous ones.

A community database, API and collaboration platform to help identify and protect against open-source malware -> https://opensourcemalware.com/ #DFIR #blueteam
OpenSourceMalware.com - Community Threat Intelligence

Security professionals sharing intelligence on malicious packages, repositories, and CDNs to protect the open source ecosystem.

https://samplepedia.cc/
New, free resource for malware samples to experiment and train.
#dfir
Welcome to Samplepedia

Strange, I cannot create a post in bluesky which contains a URL via @openvibe . Not sure what is causing this.
Blog putting some light on how Prefetch files created https://y0sh1mitsu.github.io/posts/how-are-prefetch-created/
How are Prefetch created? - y0sh1mitsu's blog

A little research about the Windows Prefetcher mecanism

y0sh1mitsu's blog