Asger.jpg Profile
Asger.jpg

@hackerkartellet

Followers
654
Following
2K
Media
27
Statuses
213

🇩🇰 living in 🇩🇪 Principal IR dude trying to do IR stuff at @InfoGuardAG https://t.co/odU86jtnLL… @hackerkartellet.bsky.social

Munich, Bavaria
Joined January 2011
Don't wanna be here? Send us removal request.
@hackerkartellet
Asger.jpg
1 month
RT @malmoeb: Yesterday, I presented "Anti-Forensic" techniques for Windows and Linux at the Troopers conference in Heidelberg. This morning….
0
17
0
@hackerkartellet
Asger.jpg
1 month
RT @LETHAL_DFIR: We just released MemProcFS-Analyzer v1.2.0 with various enhancements. Check out the changelog for more information. Happy….
Tweet card summary image
github.com
[1.2.0] - 2025-06-24 Added EZTools (.NET 9) DFIR RECmd Batch File v2.11 (2025-03-31) 423 YARA Custom Rules FS_Process_Console FS_SysInfo_Network: DNS Information Digital Signature Fixed Minor fi...
0
19
0
@hackerkartellet
Asger.jpg
2 months
RT @malmoeb: Some people commented on my post below, asking, "But isen't the domain legitimate?" Well. maybe? . Take a moment to visit th….
Tweet card summary image
wizer-training.com
This is why you should NEVER copy paste commands directly into your terminal. Ask any developer or Admin if they have ever copied a command line or code snippet from the web. T
0
6
0
@hackerkartellet
Asger.jpg
2 months
RT @LETHAL_DFIR: We just released Microsoft-Analyzer-Suite v1.5.1. This update includes bug fixes and a new version of RiskyDetections-Anal….
0
9
0
@hackerkartellet
Asger.jpg
3 months
Could you all take a moment to check that UAL is enabled on your M365 tenant? The IR team will really appreciate it later!
2
4
23
@hackerkartellet
Asger.jpg
4 months
I am reposting my old post as a reminder to regularly check which UserAgents are logging into your tenant. In more recent instances, we have noticed that TAs are using tools with the following as part of their toolkit: .'node-fetch/1.0 (+'.'GuzzleHttp/7'.
Tweet card summary image
github.com
A light-weight module that brings the Fetch API to Node.js - node-fetch/node-fetch
@hackerkartellet
Asger.jpg
9 months
Analyzed a phishing case in M365: attacker bypassed MFA using axios HTTP client, leaving a telltale "axios/1.7.7" in sign-in logs. Lesson: regularly check sign-in logs for unusual user-agents to spot suspicious activity.
Tweet media one
1
20
89
@hackerkartellet
Asger.jpg
6 months
My big boss man is having a party writing awesome blogs. Take a look!.
@malmoeb
Stephan Berger
6 months
New blog post: Tear Down The Castle - Part 2. I analyzed 250 PingCastle Reports, grouping the findings along the categories I used for my 10 AD Commandments series. The number of affected domains is stated within each finding, i.e., in how many domains we
Tweet media one
1
1
3
@hackerkartellet
Asger.jpg
6 months
RT @malmoeb: New blog post: Tear Down The Castle - Part 2. I analyzed 250 PingCastle Reports, grouping the findings….
0
49
0
@hackerkartellet
Asger.jpg
6 months
RT @Evild3ad79: I just released Microsoft-Analyzer-Suite v1.3.0. UserAgent Blacklist added, ClientInfoString and Mailbox Synchronization de….
0
28
0
@hackerkartellet
Asger.jpg
6 months
RT @malmoeb: New blog post: Tear Down The Castle - Part 1. I analyzed 250 PingCastle Reports, grouping the findings….
dfir.ch
Technical blog by Stephan Berger (@malmoeb)
0
69
0
@hackerkartellet
Asger.jpg
7 months
RT @malmoeb: New blog post: Analysis of Python's .pth files as a persistence mechanism. I dig into Pythons Path Con….
0
14
0
@hackerkartellet
Asger.jpg
7 months
RT @Evild3ad79: Teaser: Microsoft-Analyzer-Suite v1.2.0 will detect the new Device Compliance bypass technique via Microsoft Intune Company….
0
57
0
@hackerkartellet
Asger.jpg
7 months
RT @SecurityAura: For those using the full User Agent in their queries, detection, hunt, etc . Time to increment the last number. Or ev….
0
1
0
@hackerkartellet
Asger.jpg
7 months
RT @malmoeb: Did you know about the Windows Notifications database? While investigating suspicious behavior on a computer, I discovered evi….
0
48
0
@hackerkartellet
Asger.jpg
8 months
RT @malmoeb: "A system administrator noticed that the user account kiosk had an active SSL-VPN connection to the corporate network. However….
0
25
0
@hackerkartellet
Asger.jpg
8 months
RT @malmoeb: "The attacker successfully gained unauthorized access to the organization’s internal network through an SSL VPN endpoint hoste….
0
11
0
@hackerkartellet
Asger.jpg
8 months
Throwback to a case I had in June.
@malmoeb
Stephan Berger
8 months
When a user connects to a PC via the GetScreen software generates a session log file on the receiving computer. This log file records the source IP address of the connecting user and a timestamp. During an incident this past June, @hackerkartellet.
1
0
1
@hackerkartellet
Asger.jpg
8 months
RT @malmoeb: Who actively monitors the Application Event Log for the Event ID 15457, containing the string xp_cmdshell?. The screenshot bel….
0
70
0
@hackerkartellet
Asger.jpg
8 months
RT @malmoeb: I was looking through older Incident Response reports from our team and came across this paragraph here: . "The attackers were….
0
7
0
@hackerkartellet
Asger.jpg
8 months
Lessons learned: Only allow approved external tenants to contact your tenant and lock down unused RMM tools. 3/3 . Ref: and
Tweet card summary image
learn.microsoft.com
How to set up proxies and necessary endpoints
0
4
33