Roberto Rodriguez πŸ‡΅πŸ‡ͺ Profile picture
Oct 4, 2022 β€’ 9 tweets β€’ 7 min read β€’ Read on X
@jsecurity101 is next @SANSDefense ! Once upon a Login! Understanding logon sessions to add more context to your detection strategy πŸŽ‰πŸ”₯ ImageImageImageImage
The logon process structure and some of the logon context switch that we need to understand during investigations πŸš€πŸΉ A Logon Session centric data approach ! Save time! Accurate! ImageImage
Allows us to add more context to alerts exposed by vendors. Available telemetry! Sysmon exposes LogonGuid value too (good to understand how it is generated) ! MDE has 48+ actions with LogonId data 🏹 ImageImageImage
LogonSuccess, ProcessCreated, LDAP, and more via MDE. There are also limitations in relation to Newacredential events πŸ€” ImageImageImageImage
How is the research practical? MDE Alert (creds dump) -> correlate LogonId -> OpenProcessApiCall ImageImage
Example #2 - Privilege Escalation. someone logged on via RDP -> created scheduled task -> Injection Image
Example #3 - Lateral Movement - How do we know where it came from? SuccesfulLogon -> Correlate with DeviceNetworkEvents. It is challenging with DeviceNetworkEvents table because of the lack of LogonId data. ImageImageImageImage
Basic approach to identify potential lateral movement leveraging LogonType 3 context on new processes being created. Also, a script to automate some of the investigation via SENSE IR scripts. ImageImageImage
Thank you @jsecurity101 for sharing your research with the Infosec community! A few recommended free resources πŸŽ‰ ImageImage

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with Roberto Rodriguez πŸ‡΅πŸ‡ͺ

Roberto Rodriguez πŸ‡΅πŸ‡ͺ Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @Cyb3rWard0g

Aug 12, 2022
@DrAzureAD Trying to get Nestor to skip his talk 🀣 🀣🀣🍻 @ManuelBerrueta where are you?
@DrAzureAD @ManuelBerrueta Let’s go! Currently around 235 commands in AADinternals module πŸ“
@DrAzureAD @ManuelBerrueta 1) Recon as an outsider to identify initial attack vectors and gather more information about the tenant
Read 9 tweets
Dec 5, 2019
@tifkin_ Hermanooo 😊 @Cyb3rPandaH and I were talking about some of those concepts while writing a workshop/training, and we decided to put a few things on the board πŸ˜‰πŸ€£ There are a few things that need to be taken in consideration from a distribution & operationalization of detections
@tifkin_ @Cyb3rPandaH Regarding distribution we believe that besides just sharing a query, there needs to be other considerations to make sure that the detection being shared is of quality and that it could also encourage others to build on the top of it,
@tifkin_ @Cyb3rPandaH learn from it and be able to perform some initial validation before even trying to translate a query to other tools syntax right away and also avoid the COPY-PASTE-SEARCH approach.
Read 18 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(