Skip to main content

Questions tagged [detection]

Detection is the act of discovering and/or determining the existence, presence, or fact of something.

1 vote
1 answer
98 views

Is there a standard format for behavioral rules for detecting malware? Yara is a standard format for static signatures, e.g., matching based on strings and byte sequences. I'm wondering if there is a ...
D.W.'s user avatar
  • 101k
1 vote
0 answers
184 views

I am new to threat detection. I was figuring out a way for crowdstrike falcon to block the execution of malicious base64 encoded payloads on a Linux machine. Wanted to know if a setting prevention ...
EzPzLmnSqzy's user avatar
2 votes
1 answer
385 views

From a detection standpoint, when pivoting inside a network what difference (if any) is there between establishing a remote connection between using Enter-PSSession -ComputerName PC1 vs winrs -r:PC1 ...
user2334659's user avatar
7 votes
2 answers
4k views

I work at a small-to-medium business. Most of my coworkers were born in the 1960s and do not have a background in computer science. I have a background in computer science, but I specialize in ...
Micheal Gignac's user avatar
0 votes
1 answer
175 views

I'm researching the topic of detecting registry dump from disk shadow copies and realize that I don't see any specific events in the Windows and Sysmon logs. I tried a simple copy with the command: ...
ganbg's user avatar
  • 11
1 vote
1 answer
529 views

I am working on security testing of an android application. There is a root detection in the Android application. objection, frida etc. It is possible to bypass this with ways. My main question is: ...
Exnovan's user avatar
  • 35
1 vote
1 answer
306 views

I'm interested in security and redteaming in particular, and as I'm learning about the subject I'm trying to find out what kind of things a blue team EDR/XDR solution will look for as part of its ...
Rajman's user avatar
  • 11
0 votes
1 answer
481 views

I am using MS Defender for Mac to specify a list of unwanted applications on the managed devices in my company. I am concerned that some users try to evade the detection by altering the binaries of ...
Xenonite's user avatar
0 votes
1 answer
162 views

Read something like this on reddit "someone can also be a regular user who does not read terms and conditions of apps that they install. Some apps might include code that will enable them to run ...
Maxfield's user avatar
  • 173
1 vote
0 answers
127 views

So I've just had an SD card ruined & while it's not very expensive, I'd rather have it last me a much, much longer time. As a precaution going forward now, I'd like to be able to detect right away ...
Tempus Nomen's user avatar
1 vote
0 answers
143 views

Osquery is a great open standard for collecting data from endpoints, using SQL syntax. Kusto is a new Microsoft language for collecting data from Windows endpoints, using syntax which is almost--but ...
user502's user avatar
  • 3,331
4 votes
2 answers
1k views

When trying to analyze malware, have there been cases where malware detected the use of mitmproxy and ceased operation? If that has happened, would it be a good idea to be constantly using a proxy as ...
Sir Muffington's user avatar
0 votes
0 answers
171 views

I have been asked to investigate what capabilities exist within Windows 10 where the environment for this system is isolated. I believe it would not be able to benefit from an enterprise security ...
Jim's user avatar
  • 255
0 votes
1 answer
211 views

I heard many years ago from word of mouth that this kind of malware exists, which could for example blow up capacitors in your PC. Has such malware or something even remotely similar ever existed? ...
Sir Muffington's user avatar
3 votes
3 answers
1k views

I am writing an installer process (.exe). My installer deploys different components. It will add registry entries, copy files, copy files over the network, remote execute, remote PowerShell, local ...
ilansch's user avatar
  • 133

15 30 50 per page
1
2 3 4 5
17