Reading Location Position Value in Microsoft Word Documents, (Mon, Aug 25th)

While studying for the GX-FE &#;x26;#;x5b;1&#;x26;#;x5d;, I started exploring the “Position” value in the registry that helps to tell Microsoft Word where you “left off”. It&#;x26;#;39;s a feature many people that use Word have seen on numerous occasions and is explored in FOR500: Windows Forensic Analysis &#;x26;#;x5b;2&#;x26;#;x5d;.

Continue reading Reading Location Position Value in Microsoft Word Documents, (Mon, Aug 25th)

Posted in Uncategorized

The end of an era: Properly formated IP addresses in all of our data., (Sun, Aug 24th)

The Internet Storm Center and DShield websites are about 25 years old. Back in the day, I made some questionable decisions that I have never quite cleaned up later. One of these decisions was to use a “15 character 0-padded” format for IP addresses. This format padded each byte in the IP address with leading 0&#;x26;#;39;s, ensuring that they were all 15 characters long (including the &#;x26;#;39;.&#;x26;#;39;).

Continue reading The end of an era: Properly formated IP addresses in all of our data., (Sun, Aug 24th)

Posted in Uncategorized

Don’t Forget The “-n” Command Line Switch, (Thu, Aug 21st)

A lot of people like the command line, the CLI, the shell (name it as you want) because it provides a lot of powerful tools to perform investigations. The best example is probably parsing logs! Even if we have SIEM to ingest and process them, many people still fall back to the good old suite of grep, cut, awk, sort, uniq, and many more.

Continue reading Don’t Forget The “-n” Command Line Switch, (Thu, Aug 21st)

Posted in Uncategorized

Airtell Router Scans, and Mislabeled usernames, (Wed, Aug 20th)

Looking at new usernames collected by our Cowrie honeypots, you will first of all notice a number of HTTP headers. It is very common for attackers to scan for web servers on ports that are covered by our Telnet honeypots. The result is that HTTP request headers end up in our username and password database.

Continue reading Airtell Router Scans, and Mislabeled usernames, (Wed, Aug 20th)

Posted in Uncategorized

Increased Elasticsearch Recognizance Scans, (Tue, Aug 19th)

I noticed an increase in scans that appear to try to identify Elasticsearch instances. Elasticsearch is not a new target. Its ability to easily store and manage JSON data, combined with a simple HTTP API, makes it a convenient tool to store data that is directly accessible from the browser via JavaScript. Elasticsearch has, in particular, been popular for consolidating log data, and the “ELK” (Elasticsearch, Logstash, Kibana) platform has been a very successful standard for open source log management.

Continue reading Increased Elasticsearch Recognizance Scans, (Tue, Aug 19th)

Posted in Uncategorized

Keeping an Eye on MFA-Bombing Attacks, (Mon, Aug 18th)

I recently woke up (as one does each day, hopefully) and saw a few Microsoft MFA prompts had pinged me overnight. Since I had just awakened, I just deleted them, then two minutes later clued in – this means that one of my passwords was compromised, and I had no idea which site the compromised creds were for.

Continue reading Keeping an Eye on MFA-Bombing Attacks, (Mon, Aug 18th)

Posted in Uncategorized