Samir(@SBousseaden) 's Twitter Profileg
Samir

@SBousseaden

Detection Engineering | Elastic Security

Mastodon: @[email protected]

ID:1112645486

calendar_today22-01-2013 21:08:28

2,7K Tweets

23,9K Followers

1,1K Following

Ruben Groenewoud(@RFGroenewoud) 's Twitter Profile Photo

Based on additional research, we expanded the logic of our 'CVE-2023-4911: Looney Tunables' detection and endpoint rules to account for exploiting other dl tunables and other SUID/GUID binaries. Update available in github.com/elastic/detect…!

Based on additional research, we expanded the logic of our 'CVE-2023-4911: Looney Tunables' detection and endpoint rules to account for exploiting other dl tunables and other SUID/GUID binaries. Update available in github.com/elastic/detect…!
account_circle
Ruben Groenewoud(@RFGroenewoud) 's Twitter Profile Photo

Glad to see our Linux detection rule set already (unintendedly) detected CVE-2023-4911 (Looney Tunables) through github.com/elastic/detect….

Made sure we have more specific detections in place however, new endpoint and detection rules coming up!

Glad to see our Linux detection rule set already (unintendedly) detected CVE-2023-4911 (Looney Tunables) through github.com/elastic/detect…. Made sure we have more specific detections in place however, new endpoint and detection rules coming up!
account_circle
Samir(@SBousseaden) 's Twitter Profile Photo

so many funny screenshot to show 100% coverage in 2023 mitre eval for things like data obfuscation/ encoding/decoding, traffic encryption and masquerading :D

There are many example but if you want to check urself 3.A.3 - Encrypted Channel(T1573)

attackevals.mitre-engenuity.org/results/enterp…

so many funny screenshot to show 100% coverage in 2023 mitre eval for things like data obfuscation/ encoding/decoding, traffic encryption and masquerading :D There are many example but if you want to check urself 3.A.3 - Encrypted Channel(T1573) attackevals.mitre-engenuity.org/results/enterp…
account_circle
Gabriel Landau(@GabrielLandau) 's Twitter Profile Photo

Watch me drop some still-unpatched Windows exploits at BlackHat:
✅ Bypass LSASS RunAsPPL
✅ Modify kernel memory
💥 Zero vulnerable drivers

Article: tiny.cc/FVDX
Article #2: tiny.cc/KillingPPLFault
Code: github.com/gabriellandau/…
Talk: 👇 youtu.be/5xteW8Tm410

account_circle
Samir(@SBousseaden) 's Twitter Profile Photo

Elastic Defend logs process mitigation policies in process creation events

blog.xpnsec.com/protecting-you…

Elastic Defend logs process mitigation policies in process creation events blog.xpnsec.com/protecting-you…
account_circle
Gabriel Landau(@GabrielLandau) 's Twitter Profile Photo

👇 Check out my new Windows internals article detailing how Microsoft plans to kill ☠ PPLFault (some day).

elastic.co/security-labs/…

account_circle
Samir(@SBousseaden) 's Twitter Profile Photo

not sure if there are normal matches to this behv (unelevated logon token creating windows services) but should match on EoP leveraging token manip and winsvc to execute elevated cmds

gist.github.com/Samirbous/e2b3…

example of match on github.com/antonioCoco/Ss…

not sure if there are normal matches to this behv (unelevated logon token creating windows services) but should match on EoP leveraging token manip and winsvc to execute elevated cmds gist.github.com/Samirbous/e2b3… example of match on github.com/antonioCoco/Ss…
account_circle
Antonio Cocomazzi(@splinter_code) 's Twitter Profile Photo

Excited to share my hardest research about UAC 🤯

'Bypassing UAC with SSPI Datagram Contexts' 🔥

Enjoy the read! 👇

splintercod3.blogspot.com/p/bypassing-ua…

account_circle
Elastic Security Labs(@elasticseclabs) 's Twitter Profile Photo

Check out this new article from Samir that explores call stacks. Understand what they are and how they can be used for detections. Learn more: go.es.io/3ZgMpHM

account_circle