#HuntingTipOfTheDay: you know how to spot/decode Base64 or XOR in PowerShell⦠but what about SecureString? This AES-based encryption is native to PowerShell; attackers have been seen to use this for PowerShell obfuscation.
π Hunt for known SecureString decoding commands
More on this technique : https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring
#HuntingTipOfTheDay: Stuck in vi/vim? Open a reverse shell to exit remotely π
Not just a joke - you can make vi/vim run arbitrary commands, not all methods to do so are well detected.
π Hunt for child processes of vi(m), especially those that are rare in your environment.
#HuntingTipOfTheDay: Florian is right.
π©οΈ Cloud creds often linger in Environment Variables, especially on servers/dev machines
π One compromised endpoint could thus lead to a full cloud breach
π Hunt for exposed tokens - if you can see it, so could an attacker (well, kinda)
https://infosec.exchange/@cyb3rops@bird.makeup/114669259417132788
#HuntingTipOfTheDay: @oddvarmoe of @trustedsec shows how you can run a full C2 implant from Outlook - just setting a few registry keys does the trick.
Any activity concerning these registry keys should be considered suspicious.
Full story here: https://youtu.be/7MDHhavM5GM
#HuntingTipOfTheDay: TCC on macOS can be bypassed by triggering Electron apps' Node.js interface to run arbitrary commands
β‘ By using a Launch Daemon, you can leverage all the app's TCC permissions
π Hunt for processes with ELECTRON_RUN_AS_NODE env var and unusual command lines
Read more: https://afine.com/threat-of-tcc-bypasses-on-macos/