A round up of tweets from 2017 about learning and exploring security follows
Incorporate the security mindset to see security issues where others see reliability problems:
• Hardcoded metasploit addresses in crashes:
• Support case:
Learn from malware:
• Environmental keys:
• Dual #macos/Win threat:
• #PowerShell threat:
• #Python backdoor for mac:
• #Python backdoor for Windows:
Malware tips and tricks:
• Look for synchronization crutches:
• Remove password on macro docs:
• Decode some obfuscated macros:
• Use the awesome oletools by @decalage2:
#DFIR tips:
• Task Scheduler events by @jepayneMSFT:
• The cheapest deobfuscator for #PowerShell by @Lee_Holmes:
• ATA's 45 page attack playbook:
• @MSwannMSFT on graphs:
#Windows tips and tricks:
• Hit F8 to cycle through cmd history:
• One liner to enable color syntax highlighting:
• Find weak service permissions:
Notables in analyzing malware:
• Clever malware lure--a weaponized threat intel report:
• A hacker in the malware VM!
• Most daring malware lure:
Roundup of #WDATP posts (cc/ @RavivTamir, @HeikeRitter):
• Automating response:
• Use PowerBI:
• The 'why' in the alerts:
• Tree view:
• Linux/MacOS:
Does Azure have built in intrusion detection for IaaS?
This thread of ASC blogs on the topic:
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.
