39 Followers
138 Following
90 Posts
Python 🐍 | Bash | Linux |
Enjoy CTFs and following the community. Looking to make the transition into #infosec next year. Learning and progressing day by day.
PowerShell deobfuscation 101, replace Invoke-Expression with Write-Host, and read the output. The decoded script downloads a file from Discord's CDN. It then runs a search.replace for 'WH_HERE' and replaces it with the attacker's Discord webhook URL, them executes the script.

RT @[email protected]

DoNotPay plans to use its AI-based legal advisor to coach a defendant via an earpiece to fight a speeding ticket in an unnamed US courtroom in February 2023 (@[email protected] / Gizmodo)

https://gizmodo.com/donotpay-speeding-ticket-chatgpt-1849960272
http://www.techmeme.com/230107/p15#a230107p15

🐦🔗: https://twitter.com/Techmeme/status/1611938540727959552

DoNotPay's 'Robot Lawyer' Is Gearing Up for Its First U.S. Court Case

The AI legal assistant has helped people contest parking tickets, now it's leveling up to the courtroom—and the judge doesn't know.

Gizmodo
WalkerGate - A method to take syscall with memory parsing of ntdll https://github.com/DallasFR/WalkerGate #redteam
GitHub - DallasFR/WalkerGate: Find syscall

Find syscall. Contribute to DallasFR/WalkerGate development by creating an account on GitHub.

GitHub
Can we agree that touch control instead of knobs is worse UX for often-used functionality?
Turning Google smart speakers into wiretaps for $100k

I was recently rewarded a total of $107,500 by Google for responsibly disclosing security issues in the Google Home smart speaker that allowed an attacker within wireless proximity to install a "backdoor" account on the device, enabling them to send commands to it remotely over the Internet, access its microphone feed, and make arbitrary HTTP requests within the victim's LAN (which could potentially expose the Wi-Fi password or provide the attacker direct access to the victim's other devices). These issues have since been fixed.

Matt's internet home

We're getting into "silly season" at the end of the year. With that in mind, I've thought about the things I did in 2022 that I found most interesting, helpful, or potentially impactful.

First, there's the paper on #CTI-driven #ThreatHunting I wrote and presented on at several events:
https://www.gigamon.com/content/dam/resource-library/english/white-paper/wp-intelligence-driven-threat-hunting-methodology.pdf

Then, there was my @VirusBulletin paper on the #XENOTIME actor responsible for the #Triton event, which I thought was neat as a deep-dive into organizational relationships that get masked in our tracking a single "adversary:"
https://www.virusbulletin.com/uploads/pdf/conference/vb2022/papers/VB2022-Zeroing-in-on-XENOTIME-analysis-of-the-entities-responsible-for-the-Triton-event.pdf

On a personal front, I wrote up some prelimianry analysis on the #Industroyer2 attempted (?) #ICS #OT incident as part of the conflict in #Ukraine - and there are still some items raised there for which we don't have answers several months after the incident was discovered:
https://pylos.co/2022/04/23/industroyer2-in-perspective/

Finally, I wrote a blog for my employer diving into the idea of the #FalsePositive in #DetectionEngineering and #SecurityMonitoring that I think is helpful for analysts from #IR to the #SOC
https://blog.gigamon.com/2022/08/05/revisiting-the-idea-of-the-false-positive/

I need to think this over a bit, but look for something covering the most insightful work of others, from my perspective, from the past year!

The asteroid that ended the dinosaurs was technically the highest ratio of killing birds to one stone.
Want to work on Mastodon full time? I’d like to pay a Rails dev for the next 3+ months to implement some auth improvements that matter to me but also just burn down bugs, make perf improvements, whatever is needed as this place grows. Remote 100% ok but ideally need 1+ hrs of Pacific time zone overlap, 3+hrs of GMT overlap, fair pay, meaningful work. [edit: email [email protected] to discuss more] #fedihire #ruby #rails #job
Now at 1700 new accounts on the day @infosec.exchange. This is what it looks like on the load balancer:
If you don’t have a grub password then we can’t be friends.