ath0 · @scottlink
250 followers · 460 posts · Server infosec.exchange

: day 70 : Today was a day of json and powershell. Took a different approach than I usually do. Started with laying out a json schema for all the data elements I want. Then backed into into functions and code. I've coded in ksh and bash for so long, I'm more used to doing the functions first. This is more interesting, because now I hunt for LOLBAS to get the data.

#hack100days #redteam #LOLbas

Last updated 2 years ago

ath0 · @scottlink
250 followers · 458 posts · Server infosec.exchange

: day 69 : Forgot to post last night. Watched @alh4zr3d @alh4zr3d@twitter.com "Newbie Tuesday" stream. Biggest take-away was older Logitech wireless devices speak wifi. So, "BadUSB"/RubberDucky is in-play during physical tests: github.com/insecurityofthings/

#hack100days #redteam

Last updated 2 years ago

ath0 · @scottlink
248 followers · 457 posts · Server infosec.exchange

: day 68 : Watched some videos by @valhalla_dev Watched him go over some chapters out of the Rust Book and a couple of videos on malware dev.

#hack100days #rust #redteam #getsmart

Last updated 2 years ago

ath0 · @scottlink
246 followers · 456 posts · Server infosec.exchange

: day 67 : Read another chapter . This one hurt my brain and will need to be revisited.

#hack100days #rust #getsmart

Last updated 2 years ago

ath0 · @scottlink
245 followers · 455 posts · Server infosec.exchange

: day 66 : Took a crack at new release, Inject. I've gotten rusty.

#hack100days #hackthebox

Last updated 2 years ago

ath0 · @scottlink
245 followers · 454 posts · Server infosec.exchange

: day 65 : Kept chipping away at _Rust_Programming. Took at look at Defender and Advanced Threat. Created a query for finding admin users modifying registry run keys. I'm a fan of the 'project' command to grab only the columns I care about.

#hack100days #getsmart

Last updated 2 years ago

ath0 · @scottlink
245 followers · 452 posts · Server infosec.exchange

: day 64 : read another chapter of _Rust_Programming_… Site visit today, learning and relearning about processes and tech used to make the firm money. Thinking hard about attack paths and drafting possibles exercises.

#hack100days #redteam #getsmart

Last updated 2 years ago

ath0 · @scottlink
244 followers · 450 posts · Server infosec.exchange

: day 63 : Lots of context switching today, articles, newsletters, and such. Going to unplug and finish another chapter of _Rust_Programming_Language_.

#hack100days #getsmart

Last updated 2 years ago

ath0 · @scottlink
244 followers · 445 posts · Server infosec.exchange

: day 62 : Wasn't up for it yesterday, took a sick day. Did some poking around at a recent CVE. Not going to share which one at this time. Led to another thread, though. Something that could lead to finding weird... Look for instances of the Windows process WerFault.exe starting. What was the parent process? What was the user id for the process? You may find something that is well broken and needs fixing--that cleans up log files--or something that needs further research.

#hack100days #threathunting #blueteam

Last updated 2 years ago

ath0 · @scottlink
244 followers · 445 posts · Server infosec.exchange

: day 61 : Another light day. Read articles and another chapter in _Rust Programming Language_--was reminded to keep up on that via link from a @thegrugq newsletter to @buttplug.io (@twitter) thread, leading to @m_ou_se@twitter presence talking about her book _Rust Atomics and Locks_ (which is available at marabos.nl/atomics/, so I have some more reading and coding to do...

#hack100days #getsmart #rust

Last updated 2 years ago

ath0 · @scottlink
244 followers · 443 posts · Server infosec.exchange

: day 60 : Another section of CRTO done. Learned more about MSFT's Data Protection API, which was new to me. Otherwise, it was light today.

#hack100days #getsmart

Last updated 2 years ago

ath0 · @scottlink
244 followers · 439 posts · Server infosec.exchange

: day 59 : Two more sections of CRTO down. Tuned the registry run key search in Defender ATH. Noisy bugger, going to take some work to sort out "normal". Seems like a good place to hide for long-haul persistence.

#hack100days #redteam #blueteam

Last updated 2 years ago

ath0 · @scottlink
244 followers · 436 posts · Server infosec.exchange

: day 58 : Spent some time poking around log sources. Checked for logging and events matching oppsec warnings from CRTO. Created and tuned some queries for Defender ATH. There's signal in there about Registry run key creation and scheduled task creation. Good to know for and !

#hack100days #redteam #blueteam

Last updated 2 years ago

ath0 · @scottlink
244 followers · 435 posts · Server infosec.exchange

: day 57 : Finished the next section of CRTO. Juuust shy of half-way. Checked out a couple of presos at the Antisyphon "Most Offensive Con That Ever Offensived" on-line conference. I like the personalities and some of the dialogue in the panel discussion at the beginning. However, it was a little too "let's be controversial for the sake of controversy" for my taste. (I hope to get a pizza delivered to me, one day.)

#hack100days #redteam

Last updated 2 years ago

ath0 · @scottlink
244 followers · 429 posts · Server infosec.exchange
ath0 · @scottlink
243 followers · 426 posts · Server infosec.exchange

: day 55 : Completed three more sections, maybe about a 1/3 of the way through--so far, mostly review. Added another item to the list.

#hack100days #CRTO #threathuntthursday #redteam #getsmart

Last updated 2 years ago

ath0 · @scottlink
243 followers · 422 posts · Server infosec.exchange

: day 54 : Completed credential theft section for , got some good ideas for for log events and access patterns I hadn't though of before.

#hack100days #CRTO #threathuntthursday #redteam #getsmart

Last updated 2 years ago

ath0 · @scottlink
243 followers · 420 posts · Server infosec.exchange

: day 53 : Thin on the hacking today. Listened to risky.biz and got caught up on @thegrugq newsletters.

#hack100days

Last updated 2 years ago

ath0 · @scottlink
243 followers · 417 posts · Server infosec.exchange

: day 52 : Spent more time on CRTO, got through several sections. Looked at some of the tooling called out. If something tried to talk to lsass, there's a Windows Event 4656 generated. These events don't make it into Windows Defender Advanced Threat Hunting. Some KQL that *might* help a little bit: 'DeviceProcessEvents | where (FileName != "lsass.exe" and ProcessCommandLine has "lsass")' This could find where someone's trying to tinker with it from the command line. (Since lsass does get started in the normal day-to-day of things, filter out it itself being the running process, look for things trying to operate on it.)

#hack100days #redteam #blueteam #getsmart

Last updated 2 years ago

ath0 · @scottlink
243 followers · 414 posts · Server infosec.exchange

: day 51 : Spent some time going through CRTO. First two sections down. Spun up a new kali box to play around with some of the tooling covered in recon section. Reckon I'll do a once through the material before getting lab time and going after the lab exercises.

#hack100days #redteam #infosec

Last updated 2 years ago