Wes Lambert

Principal Engineer at Security Onion Solutions

Open source security advocate and platform integration.

Wes Lambert boosted:
Security Onion 🧅​securityonion@infosec.exchange
2023-03-28

#SecurityOnion 2.4 Beta 1 release is now available!

Featuring:
✅New Grid Configuration interface
✅Enhanced Grid Status interface
✅New Grid Members interface
✅Improved health metric visualizations
✅New Elastic Agent integration
and much more!

blog.securityonion.net/2023/03

2023-03-24

Did anyone else play '"Pass the Pigs" as a child, or should I just go crawl into a corner 😅​? amazon.com/Winning-Moves-Games

2023-03-23

@femaven all while trying to cram pogs into their place.

2023-03-23

@femaven I remember the vienetta as well! 😅​👌​

2023-03-23

@shortstack Don't forget the dunkaroos

2023-03-23

@shortstack I don't remember Elios, but fully recall Totino's pizza on a cracker, Flintstones push pops, fruit by the foot, Gushers, fruit roll-ups, Kudos bars, and Hi-C Fruit Punch 😅​. 90s kids = 90 grams sugar/day kids.

2023-03-14

With regard to enterprise security monitoring, many folks agree that it's best to be able to monitor from the top down, passively gathering network telemetry from a SPAN port or network TAP.

While there is ETW, Sysmon DNS and network connection logs, and more, how much of an impact has it been to not have more verbose network telemetry available during your investigations?

#DFIR
#IncidentResponse
#SecurityMonitoring
#SOC

2023-03-02

I've updated the wlambert/velociraptor
@velocidex
#velociraptor Docker image to the latest release version.

github.com/weslambert/velocira

This refers to the pre-built image.
If building locally, you'll always use the latest version.

Enjoy, and please let me know of any issues!

Wes Lambert boosted:
2023-02-17

We are stoked to announce our return to #BlackHat 2023 with our live-fire training taught by @eric_capuano and Matt Bromiley!

Sign up now: Adversary Detection & Incident Response - Network Defense Range Operations
#BHUSA #BH23 #BlackHat2023

2023-02-03

@cR0w Unfortunately, I don't think that would work for this individual, but I appreciate your response! Thanks!

2023-02-03

I have a contact looking for remote work:

- 3 years experience in/leading a #SOC
- Experience w/ multiple #EDR and log management/ #SIEM platforms
- Open to security/SOC analyst/ #GRC/Vuln mgmt roles

If you would like to chat or share an opportunity, please let me know!

#infosec
#infosecjobs

2023-01-11
2023-01-04

@mttaggart @huskyhacks Awesome! Thanks for sharing!

2023-01-03

What are the sneaky #C2 frameworks most folks don't know about?

2023-01-03

What do y'all think about a #C2 detection series including #SecurityOnion and #Velociraptor, illustrating the compliments and differences of host and network-based detection and response?

#BruteRatel
#CobaltStrike
#DFIR
#ESM
#Havoc
#Infosec
#NSM
#Sliver
#Sysmon

2022-12-23

@velocidex Thanks, and agreed! I'm planning on getting the posts into a central location soon. Right now, folks can find them via the #ArtifactsOfAutumn tag.

Wes Lambert boosted:
Whitney Champion 🍪shortstack@infosec.exchange
2022-12-23

stoked about this talk with @eric_capuano 🤓💙🌵

join us for some @velocidex nerdery in january at @cactuscon!

and more of our @recon_infosec team will also be presenting 🔥

#cactuscon11 #cc11

2022-12-22

🦖Day 92 (THE LAST DAY!) of the @velocidex #velociraptor #ArtifactsOfAutumn series

Artifact: Exchange\.Windows.EventLogs.WonkaVision

Link: docs.velociraptor.app/exchange

----

WonkaVision is a proof of concept (POC) tool to analyze Kerberos tickets and attempt to determine if they are forged (ex. #GoldenTicket), created by @exploitph and @4ndr3w6S.

github.com/0xe7/WonkaVision

Presentation:
github.com/0xe7/Talks/blob/mai

----

This artifact can run WonkaVision, then collect its generated Windows event logs. From the event logs, we can detect potentially forged Kerberos tickets.

----

This concludes the #ArtifactsOfAutumn. Hope you enjoyed it, and thanks for all of the support!

#DFIR
#Forensics
#GoldenTicket
#infosec
#ThreatHunting
#WonkaVision

Exchange.Windows.EventLogs.WonkaVision artifact overviewCreation of a golden ticketShowing currently cached ticketsPotential forged ticket detection in Velociraptor
2022-12-21

🦖Day 91 of the @velocidex #velociraptor #ArtifactsOfAutumn series

Artifact: Exchange.IRIS.Sync.Asset

Author: @StephMikiss

Link: docs.velociraptor.app/exchange

----

This artifact synchronizes clients from Velociraptor to DFIR-IRIS (dfir-iris.org/). It will parse available information of clients such as network interfaces, IP addresses, asset type and applied labels.

----

For those unfamiliar with DFIR-IRIS (@dfir_iris), it is a free, open source incident response platform that includes a host of useful and innovative features even many commercial platforms don't possess. Check it out here using the link below!

dfir-iris.org/

----

Once a client has been added to DFIR-IRIS, the asset ID from DFIR-IRIS will be added as client metadata and ‘IRIS’ will be added as label.

If a client already possesses an asset ID, it will be updated; in general, labels and the compromised status will by synchronized.

----

This artifact is very powerful due to the fact that we can quickly add clients to DFIR-IRIS from Velociraptor with very little effort.

This means that we can spend less time on managerial tasks, and more time on investigating and remediating the hosts we deem compromised.

----

That's it for now! Stay tuned to learn about more artifacts! 🦖

#DFIR
#Forensics
#Infosec
#IRIS
#ThreatHunting

Exchange.IRIS.Sync.Asset artifact overview

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst