Tyler Hudak
@SecShoggoth
Followers
7K
Following
8K
Media
545
Statuses
7K
Reverse Engineering, IR, InfoSec. Also huge RPG guy. Elder of the Internet. Tweets and opinions are my own and not the views of my employer.
Joined July 2008
Recovering a Linux backdoor that is still running but was deleted off disk: ย ย โข Check the /๐ฝ๐ฟ๐ผ๐ฐ/๐ฃ๐๐ directory for the running process ย ย โข If ๐ซ๐๐๐จ๐ฏ๐๐ซ๐๐_๐๐ฑ๐ is in it, thats the reconstructed executable. #linux #forensics #dfir
0
0
3
On ๐๐๐ด ๐ญ๐ฏ ๐ญ๐ฎ ๐ฃ๐ ๐๐ฆ๐ง, I am presenting on MS Quick Assist and how we're seeing it used in attacks. More importantly, how to perform investigations and forensics on MSQA attacks. Register here: https://t.co/JDObtGHBDy
#DFIR #forensics
watch.getcontrast.io
Microsoft Quick Assist is a great tool for streamlining IT support. Unfortunately, itโs also becoming a popular target for hackers trying to break into you...
0
0
3
A friend of mine - @OpenHeartGames - is running a D&D game all day for Extra Life. Drop by their stream and donate to a good cause! https://t.co/JzroIhmkSb
#dnd #rpg
extra-life.org
I'm raising funds with #EXTRALIFE for kids treated at my Children's Miracle Network Hospitals! I need your help to reach my fundraising goal. Please donate today to change kids' health.
0
3
4
Chevronโs ApEX combines AI with decades of expertise to accelerate smarter, confident exploration โ and help transform how our oil and gas is discovered.
6
2
15
Analyzing a MS Quick Assist compromise is not easy, but my blog on Quick Assist forensics should help: https://t.co/g20uHe96xJ
#dfir #forensics #incidentresponse
inversion6.com
Learn how attackers exploit Microsoft Quick Assist, a default Windows tool, in scams and social engineering attacks. Discover detection tips, analysis methods, and strategies to protect your business...
0
4
18
Today marks the official launch of the Inversion6 Incident Response (IR) team, and I couldn't be more excited! Ready to tackle challenges, protect, and respond like never before. Letโs go! #IncidentResponse #CyberSecurity #DFIR
https://t.co/QepG89tn0G
inversion6.com
Global cybersecurity firm launches expanded service to help companies respond and recover from cyber threats.
3
6
38
In light of the Okta news, here are some statistics on 52+ character usernames (or UPNs in Azure) I've enumerated in Azure, to give an idea of what makes a long UPN and how common they are. Out of 53 million UPNs I've collected, only 1438 individual UPNs are 52 characters+
2
30
110
Alaska embodies the edge: vast, remote, and unforgiving. It demands technology that works where others can't. @AlaskaDOTPF's drone program reduced their critical decision-making window from 28+ hours to real time. Watch how they're reimagining what's possible with Armada at the
2
12
45
Just in time for Oct31, we're thrilled to release our most anticipated scenario of the year -- Kevin Ross' lost classic "The House on the Promontory". Written back in the 1980s but unpublished until ... this all-hallows-eve. #OldSchoolLovecraftianRPG. https://t.co/FfzSLM2oD6
1
2
5
For those new to #DFIR, what skills do you feel you are missing? Working on a new training project, and looking for topics that would appeal to those new to the industry.
3
5
13
Our recent flurry of new scenario releases has prompted a few folks to ask us just how many Cthulhu Eternal scenarios now exist. The pics below show the cover of all the ones *we've* released. More info on each at https://t.co/h0rXCSZLR3 All available at https://t.co/Em5dwdfAZw
0
2
6
Just in time for the 134th Birthday of the 'old gent' from Providence, we've released another all-new Cthulhu Eternal scenario in PDF. "Fathoms Below" features a 1960s Cold War expedition to find lost Atlantis, & a homage to a certain tale about a temple. https://t.co/15VX9N05gY
0
7
6
Can anyone recommend a good copy/scan color printer? Ours sucks (Epson). Bonus points if I don't have to buy a subscription to print.
6
1
1
The Anduril Gear Store is back tomorrow. Before the doors open, we're auctioning a 1-of-1 @PalmerLuckey signed Anduril @ModRetro Chromatic & Legendary Relic capsule. All proceeds from the Gear Store & Auction will benefit @StackUpDotOrg: a military charity supporting veterans
41
65
833
So....anyone fuzzing all the config update files from other EDR vendors to see who else can be crashed?
0
0
3
I recommend reading this thread as it gives some great insight and stories into incidents. #DFIR Also, the current top comment on there is freaking incredible! https://t.co/Rw8FEj0VZ1
reddit.com
Explore this post and more from the sysadmin community
4
125
418
Also, there are MANY ways one can grab data without leaving a trace. Taking a photo with their phone, for example. Many more avenues can be explored too, depending on where data was stored (e.g. M365, Salesforce, โ๏ธ)
1
0
0
Note that inference may have to occur. For example, its unlikely to find direct evidence of copying data to a USB. Instead, you may see the access to a filename of leaked data on a USB drive letter.
1
1
1
7. Try and correlate timeframes around when files/data of interest was accessed and potential exfiltration.
1
1
1
Imaginary Ones is bubbling ๐ซง $BUBBLE is now live on OpenSea. Find the custom token page below.
78
105
368