CinCan project Profile
CinCan project

@CinCanProject

Followers
190
Following
9
Media
18
Statuses
114

Automating incident response and digital forensic tools - EU CEF funded project by NCSC-FI, Jyväskylä University of Applied Sciences & University of Oulu

Finland
Joined March 2018
Don't wanna be here? Send us removal request.
@RauliKaksonen
Rauli Kaksonen
4 years
Our recent article should be interesting for all of you working with open source infosec tools. We identified 100 popular tools based on public data. The article is available at https://t.co/RYzGmEOpSe. #Cybersecurity #OpenSource #OUSPG #UniOulu
0
4
2
@RauliKaksonen
Rauli Kaksonen
5 years
Security testers are challenged by the attackers and the need for test automation. I explore the idea of agile security testing, performing penetration testing first and designing test cases after that. https://t.co/1gWqjKMRsw #cybersecurity #agile #automation #testing
Tweet card summary image
medium.com
In this post, I explore the idea of agile security testing, performing penetration testing first and then designing security test cases
0
3
3
@RauliKaksonen
Rauli Kaksonen
5 years
I continued my posts on cybersecurity by arguing that security testing can also be done bottom-up. Compared to top-down security analysis this may produce findings faster and be more applicable in many situations. https://t.co/D9H4D6gJRK #CyberSecurity #SecurityTesting
Tweet card summary image
medium.com
Security testing is often seen as a top-down activity, which starts with threat and risk assessment and proceeds towards the details of…
0
6
4
@RauliKaksonen
Rauli Kaksonen
5 years
I continued with my blog posts on software security. Now I present 10 secure design principles and examples of how to map them into software security requirements. #CyberSecurity #SoftwareEngineering #SecureDesign https://t.co/2lvdvFeKIR
Tweet card summary image
medium.com
In this post, I go through some well-known secure design principles and how they could be applied to create useful security requirements…
0
4
7
@RauliKaksonen
Rauli Kaksonen
5 years
I wrote a blog post on software security requirements. Software features are often defined by positive features only. Security can be improved by ruling out insecure unwanted features by negative requirements. #CyberSecurity #SoftwareEngineering https://t.co/HRknjDSXsI
Tweet card summary image
medium.com
Previously, in the post “Turning tables with attackers; from fixing vulnerabilities into fixing weaknesses”, I discussed the merits of…
1
15
26
@RauliKaksonen
Rauli Kaksonen
5 years
I wrote a blog post on security testing, weaknesses, vulnerabilities, and how to turn tables with the attackers: https://t.co/umo88ENbjI #cybersecurity #security #testing
0
5
6
@ouspg
OUSPG
5 years
We held a CTF (capture the flag) event as a part of CriM 2020. This was our first time arranging a CTF. Our experience was good, but there were few things we could have improved. Read more at https://t.co/vSc7X2V6b0 #ctf #ctfd #kubernetes #infosec
Tweet card summary image
medium.com
CriM is an annual event with workshops and lectures that focuses on security and privacy of digital systems. The full program (2020) is…
0
2
1
@RauliKaksonen
Rauli Kaksonen
5 years
I had a talk with @robertvamosi from @ForAllSecure about security tools and open source (me talking from 11 mins onwards): https://t.co/VT9ZXZ9swy #infosec #opensource #cybersecurity
0
7
3
@RauliKaksonen
Rauli Kaksonen
5 years
Check out my recent blog post! I wrote how we at OUSPG preserve the native command-line experience for (cyber security) tools packaged to containers for easy installation and security. #containers #dfir #cybersecurity #commandline
0
4
1
@CinCanProject
CinCan project
6 years
Read our blog post to see what else we can do with the #shellcode and #CinCan: https://t.co/SlT1XCjlQu. 5/5
medium.com
Written by Mihai Mahalean
0
1
1
@CinCanProject
CinCan project
6 years
We find out that the #malicious JS code #exploits a buffer overflow that forces the machine to execute the #shellcode stored in the payload variable. 4/5
0
0
0
@CinCanProject
CinCan project
6 years
CinCan’s #peepdf tool extracts suspicious JavaScript code from the PDF into javascript.txt. 3/5
0
0
1
@CinCanProject
CinCan project
6 years
CinCan’s #PDFiD tool shows that the PDF contains "/JS" and "/JavaScript" objects which raises 🚩🚩 because they might contain #malicious code. 2/5
0
0
2
@CinCanProject
CinCan project
6 years
CinCan ♥️ PDFiD+peepdf: Find hidden #malware in your PDF files! PDF #exploiting a #vulnerability that enables JS execution is a common mechanism of infection. We'll use #CinCan’s tools #PDFiD to find suspicious objects in PDF and #peepdf to take a look at what’s inside them.1/5
4
1
2
@JYVSECTEC
JYVSECTEC
6 years
.@CinCanproject aims to relieve your digital #forensics pains by creating open source #tools and automated tool chains. Get acquainted with the tools: https://t.co/NyM4XSK745 #docker #DFIR #cincan #Minion #cybersecurity
0
3
4
@CinCanProject
CinCan project
6 years
Today is officially final day of the CinCan project! We would like to thank everyone who has participated to this project in a way or another. Of course there is plans to continue this work in Autumn but first we are heading to summer holiday! Have a secure summer!
2
1
7
@CinCanProject
CinCan project
6 years
CinCan project is having a workshop showcasing DFIR tools tomorrow 8:00 - 12:00 UTC https://t.co/7Dn9bvOhjt Tasks include #phishing #memoryanalysis #documentanalysis #deobfuscation #reversing #Dotnet #malware See you at 11:00 in WhereBy:
0
6
9
@CinCanProject
CinCan project
6 years
Setting up a #Cortex server has many #benefits, such as keeping track of your #analyzer job history and #support for #co-working via #organization and #user #management. See #example #setup #files, #scripts and #instructions from the blog post! 6/6 https://t.co/lJexnASVQk
0
0
0
@CinCanProject
CinCan project
6 years
After running the modification script, the #IoCs are sent to #VirusTotal, the resulting report can be seen from the #Cortex #web #interface. The #scan #report from #VirusTotal classifies the first address as #suspicious. It was a #kill #switch domain for #WannaCry ransomware.5/6
0
0
0
@CinCanProject
CinCan project
6 years
There are a number of #tools on how to extract indicators of compromise (#IoCs) for #Cortex #Analyzers. In this example we will be using the #dockerized #ioc_strings tool, which can extract #hashes, #emails and links from files. We will be analyzing a #WannaCry.exe 4/6
0
0
0