Road to Detection: YARA-L Examples — Part 4 of 3

Road to Detection: YARA-L Examples — Part 4 of 3
Upon reading all of Part 1, Part 2 and Part 3 of my blog series that revealed our (Chronicle) approach to detection, many of you asked for more YARA-L detection language examples.
Continue reading Road to Detection: YARA-L Examples — Part 4 of 3

What forensics should be collected as part of an incident response plan on Windows 10?

I am currently developing an IRP that responds to system hacks.

I have attacked the Windows 10 myself (victim machine), using Metasploit on Kali Linux, where I managed to gain access via SSH port 22. From there I have modified file exten… Continue reading What forensics should be collected as part of an incident response plan on Windows 10?

What forensics should be collected as part of an incident response plan on Windows 10?

I am in the process of creating an IRP that responds to system hacks.

I have attacked the Windows 10 myself (victim machine), using Metasploit on Kali Linux, where I managed to gain access via SSH port 22. From there I have modified file… Continue reading What forensics should be collected as part of an incident response plan on Windows 10?

Security Correlation Then and Now: A Sad Truth About SIEM

We all know David Bianco Pyramid of Pain, a classic from 2013. The focus of this famous visual is on indicators that you “latch onto” in your detection activities. This post will reveal a related mystery connected to SIEM detection evolutio… Continue reading Security Correlation Then and Now: A Sad Truth About SIEM

Alternative routes for Incident Response approach other than Windows Event Viewer?

I am in preparation of developing an Incident Response Plan for a computer that has been hacked (no malware installed, just a system hack). My plan is to analyse through Windows Event Viewer to try and detect some unusual beh… Continue reading Alternative routes for Incident Response approach other than Windows Event Viewer?