Jim Schwar Profile
Jim Schwar

@jimiDFIR

Followers
1K
Following
5K
Media
377
Statuses
6K

Security specialist who hunts for evil. Incident Responder, amateur malware analyst, independent security researcher.

Joined March 2013
Don't wanna be here? Send us removal request.
@jimiDFIR
Jim Schwar
9 years
One of the greatest joys in my life is watching someone I know succeed.
1
9
53
@reprise_99
Matt Zorich
2 years
I know some people often wonder if an Application Id they see in logs is a first-party Microsoft app, I wrote this KQL to pull down the list of apps from the MS Learn doc itself and create a table from it, so you can then query it and join to it etc - https://t.co/x9MfCefuHF
7
44
187
@jimiDFIR
Jim Schwar
3 years
regex is like Jenga, one wrong move and the whole effing thing comes crashing down
0
0
1
@jimiDFIR
Jim Schwar
3 years
Regex: when you want to match some characters, but not too many characters, but also maybe some other characters, but not those characters, unless they're followed by these other characters... you know what, never mind, let's just use brute force. 🤯🤯🤯
0
1
1
@jimiDFIR
Jim Schwar
3 years
It drives me bonkers that not all SIEMs support this and why I really like analytics platforms as the basis for threat detection/response.
0
0
0
@jimiDFIR
Jim Schwar
3 years
The choice of parsing method depends on the specific use case, the types of data being analyzed. You need all of the above available to engineers to quickly and effectively get data in front of your analysts
1
0
0
@jimiDFIR
Jim Schwar
3 years
Rule-based parsing involves creating rules that identify specific patterns or keywords within log data and extracting relevant information. This method can be useful for specific use cases, such as identifying known threats or compliance violations.
1
0
0
@jimiDFIR
Jim Schwar
3 years
Regular expressions are a powerful method of parsing that involves defining patterns in log data and extracting information based on those patterns. This method is useful for complex data structures that require more sophisticated parsing techniques.
1
0
0
@jimiDFIR
Jim Schwar
3 years
Field extraction is a method of parsing that involves identifying specific fields within a log file and extracting them for analysis. This method is useful for log files with a consistent structure and specific fields that contain relevant information.
1
0
0
@jimiDFIR
Jim Schwar
3 years
Multi-pass parsing involves analyzing the entire log file and grouping related events before performing parsing and analysis. This method can be more accurate than single-line parsing and can provide a more comprehensive view of the data.
1
0
0
@jimiDFIR
Jim Schwar
3 years
Single-line parsing reads each line of log data as a separate event and analyzes it. This approach is useful for simple data structures and can be more efficient and faster than other parsing methods.
1
0
0
@jimiDFIR
Jim Schwar
3 years
There are several types of log parsing methods, including single-line parsing, multi-pass parsing, field extraction, regular expressions, and rule-based parsing. The best method depends on the data structure and specific use case.
1
0
0
@jimiDFIR
Jim Schwar
3 years
Log parsing is the process of analyzing and extracting relevant information from log data. It is a critical component of security monitoring and threat detection.
1
0
0
@jimiDFIR
Jim Schwar
3 years
SIEM technology is like that one annoying co-worker who always has something to say but never really delivers.
0
0
2
@jimiDFIR
Jim Schwar
3 years
🧵
@netbroom
Dan Sherry
3 years
As someone who has built import/export for STIX/TAXII from scratch, i think it can be improved in a few ways.
0
1
1
@reprise_99
Matt Zorich
3 years
The billions of dollars of investment into ChatGPT and OpenAI will be worth every cent even if all I ever use it for is to solve my regex problems.
3
6
84
@Jhaddix
JS0N Haddix
3 years
🔍 My ultimate workflow for simple and easy JavaScript Analysis ⚡️ Comprehensive JavaScript analysis in offensive security, appsec testing, and red teaming wins. Often you can find juicy hidden endpoints, parameters, & domains buried JS! A thread 🧵 1/x 👇
43
244
717
@Evil_Mog
EvilMog® @mog.evil.af
3 years
If you know what the turbo button is for don't forget to take an anti-inflammatory for your back and knees today
139
283
3K
@SBousseaden
Samir
3 years
by the end of the day detection is about reducing FPs to spot bad, any evaluation that doesn't account for that to me its just scratching the surface (and indirectly participate in alerts fatigue and ++ SOC analysis cost).
6
10
68
@wimremes
Wim Remes TR
3 years
If you are an ex-member of ISC2 that has received an email in the last 6 months about potential re-certification, please DM me. RT appreciated.
1
26
15
@jimiDFIR
Jim Schwar
3 years
Anyone know of a Phishtank equivalent for malware. Something that has subjects, senders, attachment names?
0
0
0