657 Followers
163 Following
121 Posts
#Malware Analysis, #DFIR, Computer #Forensics, Incident Response, #ThreatIntel, #OSINT, #CyberSecurity
#Linux, #FreeBSD, #ReactOS and #MeshCore enthusiast 
Tips, Tricks, Tools and Trainings by ladislav_b (#Network Analyst @ESET, #Slovakia). Opinions are my own.
Webhttps://malwarelab.eu
Webhttps://baco.sk
Xhttps://x.com/malwarelab_eu
X (personal)https://x.com/ladislav_b
nostrb40c155b55a94238005acc780ad8feb89daab358d73c2035c5e14b96289e4243

Investigation scenario:
We just received three notifications with alerts from #Suricata #IDS

1) GPL SMTP vrfy root, from unknown IP to our mailserver

Shortly after that, two more alerts appeared:

2) ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response; from the same unknown IP to Windows computer in our network
3) ET MALWARE Possible Metasploit Payload Common Construct Bind_API, again from the same unknown IP to the same Windows computer

What happened?
What to do? How to analyze network traffic and investigate those alerts?

We do not have any EDR or XDR installed on that Windows computer. Right now,we have only Suricata eve.json logs ingested to the #OpenObserve #SIEM

If you would like to see more, you are welcome to attend my @suricata webinar on March 11.
Register here: https://us02web.zoom.us/webinar/register/WN_I6BNbCU2SNG2fAOEiotPiQ

📢📢📢 Ladislav Bačo is back for round two!

On March 11, Ladislav Bačo ( @malwarelab_eu ) shares practical approaches for integrating network forensics into IR workflows, with perspectives for home and small office networks.

Register: https://us02web.zoom.us/webinar/register/WN_I6BNbCU2SNG2fAOEiotPiQ

#Suricata

Yesterday I led a half-day workshop for a group of high school students. The content was purely practical: a lot of labs and hands-on exercises and challenges about computer networks, #networktrafficanalysis and #cybersecurity.

Girls made their own Ethernet cables to connect to our lab network. Then they analyzed common network protocols and their privacy issues and how the browser settings can affect the amount of sensitive information in the network traffic.

Pro tip: together with HTTPS-Only Mode in all windows, also enable DNS over HTTPS using Increased Protection or Max Protection.
Pro tip 2: even with those hardened settings, it is often possible to see which websites the user visits, because of TLS SNI or TLS Certificates

After that, the girls had the opportunity to try CTF-like activity in the lab network full of old #MikroTik and #Ubiquiti devices and virtual machines with various services exposed.

A little bit off-topic: This was the first workshop I completely led using my old #ThinkPad with #FreeBSD

#MayTheSourceBeWithYou
#PCAPorItDidntHappen

#education #womeninstem #womenintech #SecurityGirl #AjTyvIT #wireshark #CTF #handsonlearning #learningbydoing

If you've wanted to learn Zeek scripting but didn't know where to start, Evan put together a comprehensive tutorial covering the basics through building a real detection.

https://www.youtube.com/watch?v=nae8cdrUUKY

#Zeek #NetworkMonitoring #Infosec

Zeek Scripting Tutorial: Learn the Fundamentals

YouTube

Think IDS/IPS is only for enterprises? Think again.

In this webinar with Ladislav Bačo on Feb 11th, learn how #Suricata makes network monitoring accessible for SOHO, HomeLabs, and small networks—often for under €100 using everyday hardware.

Register! https://us02web.zoom.us/webinar/register/WN_v5O3SUzGQ4qzAasqM0oHoA

RE: https://infosec.exchange/@suricata/116020101997773445

Join me on Wednesday to see how to build your own home network monitoring setup under $100.
Traffic capture, IDS, lightweight SIEM and alerting included.

Notepad++ publishes a blog post saying they caught a probably-Chinese state actor hijacking their product in an attack against highly-selective targets that began last June: https://notepad-plus-plus.org/news/hijacked-incident-info-update/
Notepad++ Hijacked by State-Sponsored Hackers | Notepad++

An no, #moltbook is not AI agents-only social network. It uses REST API, so everyone could follow the howto for AI agents, register there and post anything. Including malicious content and command injects for AI agents.

Seeing posts like this on #moltbook, I am thinking about recent #threats emerging from the heavy usage of #AI agents without any security guardrails or proper controls.

This time, it is "only" a command to send an innocent email. But this could be the measurement of the potential botnet size and fingerprinting of bots and their capabilities. Next time, it might be #DDoS, #malware distribution, or #dataleak if AI agents will follow the commands to do something harmful to their humans.

This ChatGPT-like service for binary analysis is now running #radare2 on every prompt!

Combines the reports generated from batch runs of IDA, Ghidra and BinaryNinja for better contextual analysis.

Even if the primary focus is malware analysis, lots of use cases can be covered too.

https://omniasec.ai/

Omnia