John Lambert Profile picture
Corporate Vice President, Security Fellow, Microsoft Security Research, johnla(AT)https://t.co/3dGtq71Nby

Dec 22, 2017, 9 tweets

A round up of tweets from 2017 about learning and exploring security follows

Incorporate the security mindset to see security issues where others see reliability problems:
• Hardcoded metasploit addresses in crashes:
• Support case:

Learn from malware:
• Environmental keys:
• Dual #macos/Win threat:
#PowerShell threat:
#Python backdoor for mac:
#Python backdoor for Windows:

Malware tips and tricks:
• Look for synchronization crutches:
• Remove password on macro docs:
• Decode some obfuscated macros:
• Use the awesome oletools by @decalage2:

#DFIR tips:
• Task Scheduler events by @jepayneMSFT:
• The cheapest deobfuscator for #PowerShell by @Lee_Holmes:
• ATA's 45 page attack playbook:
@MSwannMSFT on graphs:

#Windows tips and tricks:
• Hit F8 to cycle through cmd history:
• One liner to enable color syntax highlighting:
• Find weak service permissions:

Notables in analyzing malware:
• Clever malware lure--a weaponized threat intel report:
• A hacker in the malware VM!
• Most daring malware lure:

Roundup of #WDATP posts (cc/ @RavivTamir, @HeikeRitter):
• Automating response:
• Use PowerBI:
• The 'why' in the alerts:
• Tree view:
• Linux/MacOS:

Does Azure have built in intrusion detection for IaaS?
This thread of ASC blogs on the topic:

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling