blueninja :verified:

Blueteam|Detection Engineering|Threat Hunting|KQL

blueninja :verified:blueninja@infosec.exchange
2024-01-05

Added fresh threat hunting ideas to my github repo. Check it: https://github:.com/xFFninja/happy_threat_hunting
#threathunting #cloudsecurity #blueteam #infosec #KQL

blueninja :verified:blueninja@infosec.exchange
2023-11-14

Get current PID of lsass.exe from registry
Get-ItemProperty -Path “HKLM:\SYSTEM\CurrentControlSet\Control\Lsa” -Name “LsaPid” | ft -Property LsaPid
Can be handy for usage with different credential dumping tools wich can accept lsass.exe’s PID as an argument (e.g. PPLdump, comsvcs.dll, nanodump, etc.)
#redteam #infosec #blueteam #threathunting

blueninja :verified:blueninja@infosec.exchange
2023-09-05

Threat Hunting hint: On Windows boxes search for process creation events with System process names run outside (%SYSTEM%) folder (e.g. smss.exe, wininit.exe, winlogon.exe, etc)
#infosec #threathunting #blueteam #dfir #malware

blueninja :verified:blueninja@infosec.exchange
2023-06-04

start.me/p/wMrA5z/cyber-threat
- awesome resource to track cyber threat reports in one place
#cybersecurity #infosec #blueteam

blueninja :verified:blueninja@infosec.exchange
2023-06-01

Cutting edge AI tools to save your time every day
#ai #chatgpt

blueninja :verified:blueninja@infosec.exchange
2023-05-30

If you are familiar with #lolbins then this definitely will be interesting for you
#LOLDrivers is the list of Windows drivers used by adversaries to bypass security mechanisms. Great resource to develop new detections in your environment
loldrivers.io/
#infosec #dfir #threathunting #blueteam

blueninja :verified:blueninja@infosec.exchange
2023-04-27

Linux folders explained.
#linux

blueninja :verified:blueninja@infosec.exchange
2023-04-19

You can activate Windows 'Run' dialog (win+R) using the following command:
rundll32.exe shell32.dll,#61
#blueteam

blueninja :verified:blueninja@infosec.exchange
2023-04-12

Hunt for malicious ISO files tip: Enable Microsoft-Windows-VHDMP/Operational logs and search for Event 12
#infosec #blueteam #threathunting #DFIR #malware

blueninja :verified:blueninja@infosec.exchange
2023-03-06

Get entire Azure Data Explorer cluster for free
aka.ms/kustofree
It includes 100GB storage. You can ingest any data.
#infosec #blueteam #KQL

blueninja :verified:blueninja@infosec.exchange
2023-02-13

Tweets with limited visibility are visible:ablobcool: #infosec

blueninja :verified:blueninja@infosec.exchange
2023-01-20

Simple PowerShell command to get AMSI string signatures: [ScriptBlock].GetField('signatures','NonPublic,Static').GetValue($null)
#infosec #redteam #blueteam

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst