Skip to main content

Questions tagged [detection]

Detection is the act of discovering and/or determining the existence, presence, or fact of something.

Filter by
Sorted by
Tagged with
0 votes
1 answer
73 views

Is there a standard format for behavioral rules for detecting malware? Yara is a standard format for static signatures, e.g., matching based on strings and byte sequences. I'm wondering if there is a ...
D.W.'s user avatar
  • 101k
2 votes
1 answer
292 views

From a detection standpoint, when pivoting inside a network what difference (if any) is there between establishing a remote connection between using Enter-PSSession -ComputerName PC1 vs winrs -r:PC1 ...
user2334659's user avatar
0 votes
1 answer
149 views

I'm researching the topic of detecting registry dump from disk shadow copies and realize that I don't see any specific events in the Windows and Sysmon logs. I tried a simple copy with the command: ...
ganbg's user avatar
  • 11
1 vote
1 answer
273 views

I'm interested in security and redteaming in particular, and as I'm learning about the subject I'm trying to find out what kind of things a blue team EDR/XDR solution will look for as part of its ...
Rajman's user avatar
  • 11
0 votes
1 answer
142 views

Read something like this on reddit "someone can also be a regular user who does not read terms and conditions of apps that they install. Some apps might include code that will enable them to run ...
Maxfield's user avatar
  • 173
1 vote
0 answers
135 views

Osquery is a great open standard for collecting data from endpoints, using SQL syntax. Kusto is a new Microsoft language for collecting data from Windows endpoints, using syntax which is almost--but ...
user502's user avatar
  • 3,331
0 votes
0 answers
149 views

I have been asked to investigate what capabilities exist within Windows 10 where the environment for this system is isolated. I believe it would not be able to benefit from an enterprise security ...
Jim's user avatar
  • 255
3 votes
3 answers
1k views

I am writing an installer process (.exe). My installer deploys different components. It will add registry entries, copy files, copy files over the network, remote execute, remote PowerShell, local ...
ilansch's user avatar
  • 133
2 votes
0 answers
1k views

Our SIEM has a Sigma rule that alerts when svchost is launched without any arguments. The logs are from a domain controller which unfortunately I don't have access to to verify. I will be reaching ...
faithsec's user avatar
0 votes
4 answers
273 views

A few hours ago, I spotted my unattended mouse moving and seeming to click on tabs. I promptly rebooted my system and removed Teamviewer (it's the only remote connection app that I have installed), ...
Olumide's user avatar
  • 101
1 vote
0 answers
167 views

How does a computer get infected with watch-video.net malware, and why aren't popular tools like windows defender or malwarebytes able to detect and remove it? Is there a practical way to prevent ...
jtlindsey's user avatar
  • 225
55 votes
6 answers
21k views

There is a lot of malware that can detect whether it is running inside a VM or sandboxed environment and if such environment is detected it can conceal it self and not execute. So why not make ...
Marcus's user avatar
  • 1,157
0 votes
1 answer
397 views

How does one defend, detect and deter golden SAML attacks?
Nathan Aw's user avatar
  • 1,073
0 votes
1 answer
2k views

Recently I downloaded Open Shell application and checked it via VirusTotal. Most famous antiviruses like Bitdefender, Nrothon, Kaspersky found nothing. But some of antiviruses thing there are some bad ...
R S's user avatar
  • 225
1 vote
1 answer
231 views

I am cross-posting this question from Serverfault, because I am in doubt where it fits best. Say I have a server set up for processing sensitive data. The few authorised users of the system are ...
Thomas Arildsen's user avatar
0 votes
1 answer
262 views

I understand that a threat is a possible security violation that might exploit the vulnerability of a system, and a attack is an action on a system that harms the organisation in some way. Therefore, ...
Ylvetal's user avatar
0 votes
2 answers
203 views

I want to do a malware test that specifically uses recent morphic malware samples (polymorphic, metamorphic, etc). There are a couple of good sources I can pull samples from, but I need to know if ...
Erelbrin's user avatar
2 votes
1 answer
218 views

There are a number of different Managed Security Service Providers (MSSPs) offering managed detection and response services. They tend to use what is called an endpoint agent, while only some use a ...
Saturn_V's user avatar
0 votes
0 answers
514 views

I am trying to find the differences between a covert timing channel and a covert storage channel in terms of detectability, performance, features, and any other advantages and disadvantages. Is ...
Nick's user avatar
  • 13
2 votes
1 answer
2k views

If an ISP wants to gather profiles on users, or block certain websites, they can fairly easily redirect outgoing UDP traffic to port 53 to their own DNS servers. How could this be detected by the end ...
Steve Sether's user avatar
  • 21.7k
2 votes
1 answer
222 views

How can I as a trusted user of a middleman company (such as PhishTank) verify whether a phishing site is valid if the scam listens only on a unique referrer link(randomly created) and is blocking any ...
tungsten's user avatar
  • 431
0 votes
1 answer
1k views

I have a yara rule that looks for multiple strings in a file and fires if the count is greater than 3. But how would I change the condition statement to only fire if greater than 3 but less than 5? ...
bigC5012's user avatar
  • 143
1 vote
0 answers
277 views

I'm currently working on Snort and I'm trying to detect meterpreter sessions in reverse TCP or HTTPS, a Trojan ... Does anyone know snort rules in order to detect this? Despite my research, I found ...
Jérémy Papin's user avatar
0 votes
1 answer
388 views

Whenever I read books or academic papers and the subject of heuristic malware detection is brought up they always say the same thing: "it can be either static or dynamic", "it may use emulation", "may ...
magnetlion's user avatar
0 votes
2 answers
2k views

My father told me that he allowed the installation of apps from unknown sources when he was asked to do it to go further with something (he said that he doesn't remember when or what he was doing). ...
Mycroft's user avatar
  • 778

1
2 3 4 5 6