DetectionLabs's profile picture. We are building a SIEM learning and training platform for detection engineers.

SOCLabs

@DetectionLabs

We are building a SIEM learning and training platform for detection engineers.

Practical Resources for Detection Engineers. || Starters 🕵🏻 and Pro || by @goodycyb medium.com/p/practical-re…


Found an interesting detail during a DFIR case: On macOS, the last log does not record all SSH logins. When an attacker runs: ssh [email protected] "command" the login won’t show up in last. ⚠️ This means attackers can bypass the usual login traces.

DetectionLabs's tweet image. Found an interesting detail during a DFIR case:
On macOS, the last log does not record all SSH logins.
When an attacker runs:

ssh user@x.x.x.x "command"

the login won’t show up in last.

⚠️ This means attackers can bypass the usual login traces.

SOCLabs reposted

😈 ChromeAlone - Transform Chromium browsers into a C2 Implant. A la Cobalt Strike or Meterpreter. @defcon talk and tool release by @praetorianlabs' Michael Weber. ChromeAlone contains a number of out of the box components, including: - A malicious Chrome extension that can…

clintgibler's tweet image. 😈 ChromeAlone - Transform Chromium browsers into a C2 Implant.
A la Cobalt Strike or Meterpreter.
@defcon talk and tool release by @praetorianlabs' Michael Weber.

ChromeAlone contains a number of out of the box components, including:

- A malicious Chrome extension that can…

A critical server’s login sources are usually limited to a few stable IPs ⚠️ When a new, unfamiliar IP suddenly shows up in the logs— it could be the first sign of an intrusion 🎯 New Challenge: 《IP Access Baseline Deviation Detection》 👀 Can you detect it right away?…

DetectionLabs's tweet image. A critical server’s login sources are usually limited to a few stable IPs
⚠️ When a new, unfamiliar IP suddenly shows up in the logs—
it could be the first sign of an intrusion

🎯 New Challenge: 《IP Access Baseline Deviation Detection》
👀 Can you detect it right away?…

SOCLabs reposted

Two years ago I published a two part series on #MSGraph logs and how to use them for threat hunting. Now comes part 3 and the logs are finally available to the masses. #EntraID #KQL #Security cloudbrothers.info/en/detect-thre…


🎣 New Detection Challenge Live! We've just released our latest security detection challenge: "Double Extension Spoofing" Double extension spoofing is a classic phishing technique where attackers disguise executable files as regular documents. Can you spot this phishing trick?…

DetectionLabs's tweet image. 🎣 New Detection Challenge Live!

We've just released our latest security detection challenge: "Double Extension Spoofing"

Double extension spoofing is a classic phishing technique where attackers disguise executable files as regular documents. Can you spot this phishing trick?…

🚨 Just released: Browser Credential Theft Detection Challenge! 🕵️‍♂️🔐 It covers credential theft methods for multiple browsers 🛡️ Test if you can complete the challenge and validate your detection rules! 👇 Try it now:soc-labs.top/en/detections/… #ThreatDetection #BlueTeam #SIEM

DetectionLabs's tweet image. 🚨 Just released: Browser Credential Theft Detection Challenge! 🕵️‍♂️🔐
It covers credential theft methods for multiple browsers 🛡️
Test if you can complete the challenge and validate your detection rules!
👇 Try it now:soc-labs.top/en/detections/…

#ThreatDetection #BlueTeam #SIEM…

🚨 New Detection Challenge! 🚨 SOCLabs just launched a Password Spraying & Credential Access Detection challenge! Test your SIEM query skills and see if you can catch the attack. Ready to level up? Try it now on SOCLabs! 🔍💻 👉 soc-labs.top/en/detections/… #CyberSecurity #SIEM

DetectionLabs's tweet image. 🚨 New Detection Challenge! 🚨

SOCLabs just launched a Password Spraying & Credential Access Detection challenge!
Test your SIEM query skills and see if you can catch the attack.
Ready to level up? Try it now on SOCLabs! 🔍💻

 👉 soc-labs.top/en/detections/…

#CyberSecurity #SIEM…

SOCLabs reposted

ClickFix variant targeting Mac users through X ads. Tries tricking users into "cleaning" their Macs by running a terminal command. Domain: hxxps://top-fixer[.]com/?p=141 Distributes install[.]sh file: virustotal.com/gui/file/525be…

pcrisk's tweet image. ClickFix variant targeting Mac users through X ads. Tries tricking users into "cleaning" their Macs by running a terminal command. Domain: hxxps://top-fixer[.]com/?p=141 Distributes install[.]sh file: virustotal.com/gui/file/525be…
pcrisk's tweet image. ClickFix variant targeting Mac users through X ads. Tries tricking users into "cleaning" their Macs by running a terminal command. Domain: hxxps://top-fixer[.]com/?p=141 Distributes install[.]sh file: virustotal.com/gui/file/525be…

SOCLabs reposted

Thanks for the shoutout to the Zen of Security Rules br0k3nlab.com/resources/zen-… Cool initiative to see this applied to threat hunting as well 🤙 Thanks for sharing @_w0rk3r

br0k3nlab.com

The Zen of Security Rules

Abstract The Zen of python does a perfect job succinctly capturing guiding principles for developing via 19 aphorisms. This is the zen of writing security rules, for fostering high-quality, high-ef...

THRUNTING isn’t just a buzzword. It’s a mindset. 🐑 Inspired by Tim Peters’ 19 aphorisms for Python, @THOR_Collective Dispatch introduces "The Zen of Thrunting." dispatch.thorcollective.com/p/the-zen-of-t… Stay curious. Happy thrunting.



SOCLabs reposted

An increased visibility into threads' call stacks helps with more reliable malware detection. The approach is based on ETW telemetry and module's Export Directory data for information enrichment. A post by John Uhlmann of @elasticseclabs. Great read! #redteam #blueteam #maldev

SEKTOR7net's tweet image. An increased visibility into threads' call stacks helps with more reliable malware detection.

The approach is based on ETW telemetry and module's Export Directory data for information enrichment.

A post by John Uhlmann of @elasticseclabs. Great read!

#redteam #blueteam #maldev…

SOCLabs reposted

Used Claude to generate a Splunk query to hunt for browser exploits and potential @mrd0x #FileFix #clickfix like behaviors in Sysmon Process Create events. Ran it in a fortune 50 environment and for a 7 day period only had 200~ events out of 200 Million pastebin.com/PJGZuArj


Inspired by this new FileFix technique from @mrd0x , we've launched a hands-on detection challenge! Write and test SIEM rules Splunk, Elastic, KQL, Sigma, OpenSearch in your browser. Try it now: 👉 https:soc-labs.top/en/detections/… #SIEM #DetectionEngineering #CyberSecurity #FileFix

soc-labs.top

SOCLabs Detection Hub-Security Detection Challenge Platform

SOCLabs Detection Hub-Security Detection Challenge Platform

FileFix - A ClickFix Alternative mrd0x.com/filefix-clickf…

mrd0x's tweet image. FileFix - A ClickFix Alternative

mrd0x.com/filefix-clickf…


And us

How to become a decent detection engineer: 1. Download Aurora 2. Run whatever your EDR misses through Aurora 3. Deploy the Sigma rules from Aurora to your SIEM



SOCLabs reposted

Did you know that you can kerberoast without any valid credentials? All you need is an account that is ASREProastable. This allows you to request service tickets for any account with a set SPN🔥 NetExec now has a native implementation of this technique, thanks to Azox

al3x_n3ff's tweet image. Did you know that you can kerberoast without any valid credentials? All you need is an account that is ASREProastable.
This allows you to request service tickets for any account with a set SPN🔥

NetExec now has a native implementation of this technique, thanks to Azox

United States Trends

Loading...

Something went wrong.


Something went wrong.