hey all - I am giving away a free seat in my onlin...
# general
d
hey all - I am giving away a free seat in my online Osquery for Security Analysis course (LearnOsquery.com) Just thumbs up this post and reply to tell me your favorite host artifact when working an investigation. Do that by 9 PM ET Friday and you'll be entered to win!
👍 6
m
The powershell operational log is pretty magical when configured sanely. Script block logging ++
👍 1
j
shellbags, because they have the best artifact name
👍 1
h
On macOS I like looking at file metadata (mdls); on Windows, looking at file timestamp anomalies to see if a program or file was backdated to avoid detection.
👍 1
a
I've used OSQuery to find people avoiding our corporate monitoring systems(Disabling jamf, adding fake hosts entries for log shipping)
👍 1
r
carves for the win! A huge advantage while doing IR
👍 1
s
It's probably too late, but listing interesting file extensions in webroots/ftproots and smb shared directories is giving me nice results for detecting sensitive data shared by sysadmins violating company policy.
j
Hi @defensivedepth, did you announce a winner?
d
Yes, last night....https://twitter.com/chrissanders88/status/1117847833447501825 Thanks for submitting an entry and better luck next time! 🙂 @Michael Bailey @John Coast @harveywells @atom @reynas @srozb
h
🎉Congrats Sirius_Malware 🎉
☝️ 1