Artwork

Το περιεχόμενο παρέχεται από το IMF Security and Brian and Michael. Όλο το περιεχόμενο podcast, συμπεριλαμβανομένων των επεισοδίων, των γραφικών και των περιγραφών podcast, μεταφορτώνεται και παρέχεται απευθείας από τον IMF Security and Brian and Michael ή τον συνεργάτη της πλατφόρμας podcast. Εάν πιστεύετε ότι κάποιος χρησιμοποιεί το έργο σας που προστατεύεται από πνευματικά δικαιώματα χωρίς την άδειά σας, μπορείτε να ακολουθήσετε τη διαδικασία που περιγράφεται εδώ https://el.player.fm/legal.
Player FM - Εφαρμογή podcast
Πηγαίνετε εκτός σύνδεσης με την εφαρμογή Player FM !

Ep 012 - Laughing at Binaries - LOLBin/LOLBas

49:30
 
Μοίρασέ το
 

Manage episode 262367379 series 2681668
Το περιεχόμενο παρέχεται από το IMF Security and Brian and Michael. Όλο το περιεχόμενο podcast, συμπεριλαμβανομένων των επεισοδίων, των γραφικών και των περιγραφών podcast, μεταφορτώνεται και παρέχεται απευθείας από τον IMF Security and Brian and Michael ή τον συνεργάτη της πλατφόρμας podcast. Εάν πιστεύετε ότι κάποιος χρησιμοποιεί το έργο σας που προστατεύεται από πνευματικά δικαιώματα χωρίς την άδειά σας, μπορείτε να ακολουθήσετε τη διαδικασία που περιγράφεται εδώ https://el.player.fm/legal.

Formerly the Brakeing Down Incident Response Podcast

Recorded Oct 2019

TOPIC: Laughing at Binaries - LOLBin/LOLBas

OUR GUEST WILL BE:

  • Oddvar Moe, Sr. Security Consultant TrustedSec - Red Teamer

  • @Oddvarmoe

  • Blog - https://oddvar.moe/

  • lolbas-project.com

  • https://github.com/api0cradle/UltimateAppLockerByPassList

  • https://github.com/api0cradle/PowerAL

OUR SPONSORS:

NEWS-WORTHY:

Cyber Security Awareness Month

  • Share something that can help SMBs, your family or friends

Flaw with SUDO that lets you get admin priv when denied

  • Patch patch patch...

Microsoft Enables Tamper Protection by Default for all Windows 10 Users to Defend Against Attacks

Most Americans do not know what MFA is????

Hackers bypassing some types of 2FA security FBI warns

SITE-WORTHY:

Guest - LolBin/LolBas - api0cradle - aka Oddvar Moe

TOOL-WORTHY:

Guest:

MALWARE OF THE MONTH:

New Dridex version

  1. Delivered via Office document or Email with URL

  2. wscript/csript downloads bad binary named Chrome.exe

  3. Calls Scheduled task for persistence

  4. Chrome calls msra.exe for comms

    1. C:\Windows\syswow64\Msra.exe chrome.exe

  1. So another LOLBin ? This is what prompted this podcast

TOPIC OF THE DAY:
Laughing at Binaries - LOLBin/LOLBas

What is a LOLBin and LOLBas?

  1. It stands for Living off the Land Binary and Scripts

  2. Libraries too, Dlls

What started all this?

  1. @SubTee Casey Smith efforts on Application Whitelisting bypasses from 2015 ish where he found ways to use existing binaries on the system to do bad things like RegSvr32, RegAsm, RunDll32, and several others

Why are these an issue for us Defenders?

  1. Well Pentesters and Red Teams use them to get around security solutions like AV, EDR and App Whitelisting

Do these normally execute? If so how noisy are they?

  1. Some are noisy

What do we need to watch out for?

  1. Command line parameters are key

  2. What is are the parameters they are executing with these utilities

Are there any lists people can use?

  1. Malware Archaeology Logging page has a list and link to Oddvar’s page

What about security solutions, do we need to be concerned with these?

  1. Yes, many AV and EDRs will not have alerts for these items

  2. You will need to build some alerts and filter out the good/noise

What about logging theme?

  1. Use the list(s) and build a lookup list that you can add to 4688 events or Sysmon 1 and 7 events and monitor them

What about MITRE ATT&CK, do they reference these?

  1. Yes, there are several of these mentioned in MITRE ATT&CK, so map your tools to ATT&CK Techniques

Are there ways to test for these LOLs

What else do people need to watch out for?

Other Articles:

-------------------

Casey Smith @SubTee - Red Canary

Bypassing Application Whitelisting

SHMOOCon 2015 -

SANS

DerbyCon 2016 -

DerbyCon 2019 -

Oddvar Moe talk on LOLBin at DerbyCon 2018

Alternate Data Streams:

  continue reading

15 επεισόδια

Artwork
iconΜοίρασέ το
 
Manage episode 262367379 series 2681668
Το περιεχόμενο παρέχεται από το IMF Security and Brian and Michael. Όλο το περιεχόμενο podcast, συμπεριλαμβανομένων των επεισοδίων, των γραφικών και των περιγραφών podcast, μεταφορτώνεται και παρέχεται απευθείας από τον IMF Security and Brian and Michael ή τον συνεργάτη της πλατφόρμας podcast. Εάν πιστεύετε ότι κάποιος χρησιμοποιεί το έργο σας που προστατεύεται από πνευματικά δικαιώματα χωρίς την άδειά σας, μπορείτε να ακολουθήσετε τη διαδικασία που περιγράφεται εδώ https://el.player.fm/legal.

Formerly the Brakeing Down Incident Response Podcast

Recorded Oct 2019

TOPIC: Laughing at Binaries - LOLBin/LOLBas

OUR GUEST WILL BE:

  • Oddvar Moe, Sr. Security Consultant TrustedSec - Red Teamer

  • @Oddvarmoe

  • Blog - https://oddvar.moe/

  • lolbas-project.com

  • https://github.com/api0cradle/UltimateAppLockerByPassList

  • https://github.com/api0cradle/PowerAL

OUR SPONSORS:

NEWS-WORTHY:

Cyber Security Awareness Month

  • Share something that can help SMBs, your family or friends

Flaw with SUDO that lets you get admin priv when denied

  • Patch patch patch...

Microsoft Enables Tamper Protection by Default for all Windows 10 Users to Defend Against Attacks

Most Americans do not know what MFA is????

Hackers bypassing some types of 2FA security FBI warns

SITE-WORTHY:

Guest - LolBin/LolBas - api0cradle - aka Oddvar Moe

TOOL-WORTHY:

Guest:

MALWARE OF THE MONTH:

New Dridex version

  1. Delivered via Office document or Email with URL

  2. wscript/csript downloads bad binary named Chrome.exe

  3. Calls Scheduled task for persistence

  4. Chrome calls msra.exe for comms

    1. C:\Windows\syswow64\Msra.exe chrome.exe

  1. So another LOLBin ? This is what prompted this podcast

TOPIC OF THE DAY:
Laughing at Binaries - LOLBin/LOLBas

What is a LOLBin and LOLBas?

  1. It stands for Living off the Land Binary and Scripts

  2. Libraries too, Dlls

What started all this?

  1. @SubTee Casey Smith efforts on Application Whitelisting bypasses from 2015 ish where he found ways to use existing binaries on the system to do bad things like RegSvr32, RegAsm, RunDll32, and several others

Why are these an issue for us Defenders?

  1. Well Pentesters and Red Teams use them to get around security solutions like AV, EDR and App Whitelisting

Do these normally execute? If so how noisy are they?

  1. Some are noisy

What do we need to watch out for?

  1. Command line parameters are key

  2. What is are the parameters they are executing with these utilities

Are there any lists people can use?

  1. Malware Archaeology Logging page has a list and link to Oddvar’s page

What about security solutions, do we need to be concerned with these?

  1. Yes, many AV and EDRs will not have alerts for these items

  2. You will need to build some alerts and filter out the good/noise

What about logging theme?

  1. Use the list(s) and build a lookup list that you can add to 4688 events or Sysmon 1 and 7 events and monitor them

What about MITRE ATT&CK, do they reference these?

  1. Yes, there are several of these mentioned in MITRE ATT&CK, so map your tools to ATT&CK Techniques

Are there ways to test for these LOLs

What else do people need to watch out for?

Other Articles:

-------------------

Casey Smith @SubTee - Red Canary

Bypassing Application Whitelisting

SHMOOCon 2015 -

SANS

DerbyCon 2016 -

DerbyCon 2019 -

Oddvar Moe talk on LOLBin at DerbyCon 2018

Alternate Data Streams:

  continue reading

15 επεισόδια

Minden epizód

×
 
Loading …

Καλώς ήλθατε στο Player FM!

Το FM Player σαρώνει τον ιστό για podcasts υψηλής ποιότητας για να απολαύσετε αυτή τη στιγμή. Είναι η καλύτερη εφαρμογή podcast και λειτουργεί σε Android, iPhone και στον ιστό. Εγγραφή για συγχρονισμό συνδρομών σε όλες τις συσκευές.

 

Οδηγός γρήγορης αναφοράς

Ακούστε αυτήν την εκπομπή ενώ εξερευνάτε
Αναπαραγωγή