_robon_ Profile Banner
PARTH Profile
PARTH

@_robon_

Followers
344
Following
25K
Media
87
Statuses
632

Highly skilled and highly sophisticated;

::internet
Joined October 2016
Don't wanna be here? Send us removal request.
@_robon_
PARTH
7 months
Are you having trouble converting Sigma rules in Qualys Query?.I developed the pySigma backend for Qualys, which simplifies the process.
Tweet card summary image
github.com
pySigma backend and pipeline for Qualys Query Language - FourCoreLabs/pysigma-backend-qualys
0
0
1
@_robon_
PARTH
8 months
Compiled a comprehensive Windows Event Log cheatsheet mapping 35+ critical Event IDs to MITRE ATT&CK TTPs!.#ThreatHunters #adversary #InfoSec #WindowsSecurity #DFIR.
0
1
2
@_robon_
PARTH
8 months
I've just published a comprehensive guide on detecting Pass-the-Hash attacks in Windows networks. The guide covers key indicators, real-world examples, and practical defence strategies. Check out the full blog!.
0
0
0
@_robon_
PARTH
8 months
In Active Directory, unmanaged workstation logon permissions can be a goldmine for attackers, enabling lateral movement and targeting high-privilege user sessions. Check Out My Blog for more info.
0
0
0
@_robon_
PARTH
8 months
Last year, I explored how Windows' network diagnostic utility could be exploited to load malicious DLLs through the UtilityFunctions.ps1 script⁠⁠. Finally sharing it with you all!.
0
0
0
@_robon_
PARTH
9 months
Lateral movement is fundamentally all about identifying and hunting for high-privilege users.
0
0
1
@_robon_
PARTH
10 months
Considerations:.- Set thresholds for the number of accesses within a certain period to reduce false positives, adjusting based on baseline activity levels. - Configure alerts to notify the security operations team via email or a central dashboard immediately.
1
0
0
@_robon_
PARTH
10 months
- Alert when the registry path is accessed by any process other than WinSCP.exe. - Alert if there are multiple accesses within a short timeframe, which could indicate a brute force attempt or scanning activity.
Tweet media one
1
0
0
@_robon_
PARTH
10 months
Enable Windows registry auditing (Event ID 4657) to track changes or access, capturing details such as the accessing process, time, and what was modified.
Tweet media one
1
0
0
@_robon_
PARTH
10 months
WinSCP: WinSCP stores session information and potentially sensitive credentials in the Windows Registry under the path: HKCU\Software\Martin Prikryl\WinSCP 2
Tweet media one
1
0
0
@_robon_
PARTH
10 months
Configure the SIEM to trigger alerts when there are unauthorized or anomalous read, write, or modification events on sitemanager.xml and recentservers.xml,
Tweet media one
1
0
0
@_robon_
PARTH
10 months
Enable detailed file access auditing through Windows event logs (Event ID 4663) to capture the accessing user account, process name, and the exact time of access.
Tweet media one
1
0
0
@_robon_
PARTH
10 months
FileZilla: FileZilla stores FTP credentials in configuration files, which can expose sensitive data on your FTP servers to potential attackers.- file path: %APPDATA%\FileZilla\recentservers.xml
Tweet media one
1
0
0
@_robon_
PARTH
10 months
The key targets in this case are:.1. FileZilla FTP Credentials: Parsed from configuration files stored locally. 3. WinSCP FTP/SSH Credentials: Retrieved from registry values. 2. Chrome Cookies: Extracted from Chrome’s SQLite database.
1
0
0
@_robon_
PARTH
10 months
Detection Techniques for Lumma Stealer and Credential Theft in GitHub Phishing Campaigns.
1
0
0
@_robon_
PARTH
10 months
This time my boi is ready with excel.exe 😂.
@Ozzny_CS2
Ozzny
10 months
Today is the day forsaken is free 🇮🇳. His 5 year ban ends and he is now able to play on Valve events again 😭
Tweet media one
Tweet media two
0
0
1