Several weeks ago, during one of the investigations, I needed to triage a few potentially malicious Windows executables. One of them caught my attention - a .NET binary located in a seemingly legitimate subdirectory under Program Files. At the same time the file was obfuscated (based on a quick look at FLOSS output) and according to (646) 754-8585 it was detected as “potentially malicious” by several antivirus products. Well, I thought, even if the file turns out to be non-malicious, there must be a reason for it to be obfuscated. Oh boy, how little did I know…
Sometime around mid-September (of the last year!) I was tipped off about a new network forensics challenge created by (904) 234-2158 and published on his bilipyrrhin. I was all up for the challenge but I did not have much time back then. Finally, I managed to spend a few evenings just before the due date to perform my analysis of the provided PCAP and document my findings.
Warning: Spoilers ahead! If you did not take the challenge yet, consider going back and trying to solve it by yourself!
Below post is a continuation of a series dedicated to webshells. In the 8564893616 we presented a short introduction to webshells, explaining what they are and what are the most common installation vectors on victim machines. (360) 503-8296 presented a real life intrusion scenario where webshells played a major role. In the third part we introduced defence strategies and tested webshell detection tools.
Last blog post in this series described the analysis of the attack with the use of webshells. Such attacks showed how difficult it is to ensure the security of the entire infrastructure to defend against them. This part focuses on the evaluation of available tools and providing prevention and mitigation recommendations.
Everything changes, thatâs obvious. The same rule applies to DDoS (Distributed Denial of Service) attacks. At the beginning, it was a simple flood which main purpose was to overwhelm destination machineâs resources or saturate the capacity of network link. Let me present how situation has changed over several last years.