Sajid Nawaz Khan 

150 Followers
476 Following
309 Posts
CTI, DFIR, Python Data Analysis. Oh, and food, films, museums, plants and kindness πŸ³οΈβ€πŸŒˆπŸ‡¬πŸ‡§
GitHubhttps://github.com/ssnkhan
Keybasehttps://snkhan.keybase.pub/mastodon.html
LocationSheffield, United Kingdom

The release of ATT&CK v19, expected on 28 April 2026, will split the Defense Evasion tactic into two: Stealth, and Impair Defenses.

As a result of these updates, a number of sub-techniques within T1562 (Impair Defenses) will likely now be promoted to technique level. More details at:

https://medium.com/mitre-attack/defense-evasion-split-a-tale-of-two-tactics-5d533545fa32

Defense Evasion Split: A Tale of Two Tactics

By Allison Henao and Alice Koeninger

Medium
@ivory Running build 24177 on iPad, and the app clips into the status bar. Rotating to landscape and back fixes it momentarily, until the app is relaunched.

I shall never tire of the Barbican.

#Barbican #CityofLondon #Brutalism #X100VI

If you’re a macOS user supporting with Windows digital forensics, you’ll love IRFlow Timeline:

β€œA high-performance native macOS application for DFIR timeline analysis. Built on Electron + SQLite to handle large files for forensic timelines (CSV, TSV, XLSX, EVTX, Plaso) without breaking a sweat. Inspired by Eric Zimmerman's Timeline Explorer for Windows.”

https://github.com/r3nzsec/irflow-timeline

/cc @taylorparizo @timb_machine @tazwake @4enzikat0r #DFIR

GitHub - r3nzsec/irflow-timeline: DFIR Timeline Analysis for macOS β€” SQLite-backed viewer for CSV, TSV, XLSX, EVTX, and Plaso files with built-in process inspection, lateral movement tracking, and persistence detection.

DFIR Timeline Analysis for macOS β€” SQLite-backed viewer for CSV, TSV, XLSX, EVTX, and Plaso files with built-in process inspection, lateral movement tracking, and persistence detection. - r3nzsec/i...

GitHub

@teamcymru_S2 Hi, can you please include the publishing date on your blog posts please? e.g.,

https://www.team-cymru.com/post/tracking-orbs-on-singapores-telecommunications-networks

APT Attacks in Singapore Telecom: UNC3886 ORB Tracking Explained

APT attacks by UNC3886 target Singapore telecom using ORB networks. Learn practical ORB tracking techniques to uncover hidden infrastructure with Scout.

The new REMnux MCP server connects AI agents to 200+ malware analysis tools. I was surprised at the depth of investigation it can deliver: https://zeltser.com/ai-malware-analysis-remnux

Most of my time on this project went into capturing how I approach malware analysis and making sure the server provides the right guidance at the right time, so that AI can think and adapt as it creates the workflow. The post includes interactive replays of real analysis sessions.

#malware #malwareanalysis #infosec #cybersecurity #tools #artificialintelligence #AI

Using AI Agents to Analyze Malware on REMnux

To analyze malware effectively, AI agents need practitioners' expertise and access to the analysis tools. The REMnux MCP server provides both, connecting AI to 200+ tools on REMnux with guidance on which to run and how to interpret their output.

Lenny Zeltser

A convoluted Lotus Blossom infection chain leads to an otherwise unremarkable Cobalt Strike configuration:

https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/

#cobaltstrike #lotusblossom

@ShellFish Happy New Year! Found a reproducible bug, which hides the Settings heading label across all areas:

1. Settings
2. Shell Integration (make no changes, then back out to the previous screen)
3. All Titles now missing

This also causes havoc in various places, like in the Snippets page.

Sad news today, another veteran has been taken from us. Ruth Bourne, WWII Bletchley Park Bombe operator has died aged 98.
She started working at BP aged just 18.
Thank you for your service Ruth, we will remember you.

https://news.sky.com/story/wwii-bletchley-park-enigma-codebreaker-ruth-bourne-dies-aged-98-13485185

WWII Bletchley Park Enigma codebreaker Ruth Bourne dies aged 98

Ms Bourne's contribution to the monumental task of breaking the Nazis' Enigma cypher was "truly historic", a veterans' charity has said.

Sky

🚨 Incident Response
===================

Executive summary: The Windows Registry remains a primary source of forensic telemetry. The 2025 cheat sheet compiles core hives and the most commonly useful artifacts for DFIR practitioners, focusing on user activity, USB/device history and account-level data.

Technical details:
β€’ Key hive files documented include NTUSER.DAT (user profile settings and activity), UsrClass.dat (per-user shell mappings), SAM (local account metadata and password hashes), and SYSTEM (system configuration and device history).
β€’ Notable artifacts listed for NTUSER.DAT include UserAssist, RunMRU, OpenSaveMRU, OfficeMRU, LastVisitedMRU, RecentDocs, WordWheelQuery, TypedPaths, ShellBags, MountPoints2, and user-specific autorun entries.
β€’ UsrClass.dat is highlighted for ShellBag and MUICache entries that help validate folder access and GUI program execution.
β€’ SAM is noted for local account details (username, SID, creation/last logon times) and offline password hashes useful in credential recovery scenarios.
β€’ SYSTEM is called out for ShimCache entries, Activity Moderator (BAM/DAM) artifacts, Windows Services configuration, MountedDevices, and Enum\USB\USBSTOR records (Vendor ID, Product ID, serial number, and first/last attach times).

Detection guidance (artifacts to search):
β€’ Inspect UserAssist and RunMRU to reconstruct interactive program execution.
β€’ Parse ShellBags and MountPoints2 for evidence of folder access and mounted media.
β€’ Query Enum\USB\USBSTOR and MountedDevices within the SYSTEM hive for USB device timelines.

Investigation tips (from the source):
β€’ Prioritize user vs. system hives depending on scope of inquiry.
β€’ Correlate registry-derived timestamps with file system and event log timelines for validation.

Limitations:
β€’ Artifact presence and completeness vary by OS version and user behaviour; not all entries prove execution β€” some indicate existence or access only.

πŸ”Ή registry #DFIR #windows #forensics

πŸ”— Source: https://www.cybertriage.com/blog/windows-registry-forensics-cheat-sheet-2025/

Windows Registry Forensics Cheat Sheet 2025

Save. This. Post. Our expert staff has compiled an up-to-date and comprehensive Windows Registry forensics cheat sheet, and it might be just what you need

Cyber Triage