github.com/SlimKQL/Hunt...
03.01.2025 12:11 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0@stevenlim.bsky.social
#Cybersecurity #Sentinel #DefenderXDR #KQL #Azure #M365 #KQLWizard https://detections.ai/user/KQLWizard
github.com/SlimKQL/Hunt...
03.01.2025 12:11 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0LDAPNightmare POC Detection
www.safebreach.com/blog/ldapnig...
Custom detection code:
github.com/SlimKQL/Hunt...
Custom detection code:
github.com/SlimKQL/Hunt...
๐๐๐๐๐ผ๐บ ๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ฒ๐ฟ๐ซ๐๐ฅ ๐๐ฒ๐๐ฒ๐ฐ๐๐ถ๐ผ๐ป - ๐๐น๐ผ๐ฐ๐ธ๐ถ๐ป๐ด 2๏ธโฃ4๏ธโฃ ๐ ๐ฎ๐น๐ถ๐ฐ๐ถ๐ผ๐๐ ๐๐ต๐ฟ๐ผ๐บ๐ฒ ๐๐
๐๐ฒ๐ป๐๐ถ๐ผ๐ป๐๐ก๏ธ
www.extensiontotal.com/cyberhaven-i...
Hunting 16 Malicious Chrome Extension๐ฅ
thehackernews.com/2024/12/16-c...
github.com/SlimKQL/Hunt...
๐จ Reports suggest US authorities may ban TP-Link Wi-Fi routers in 2025. Regulated industries, ensure your end users aren't connected to TP-Link routers. Use MDE discovery and DefenderXDR's SeenBy() to detect connections. ๐ก๏ธ๐ก
22.12.2024 16:28 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0Advanced Vishing KQL Detection by sending your Teams PSTN call log to ADX ๐ฏ
www.trendmicro.com/en_us/resear...
Thanks! :) The threat actor social engineering attacks are targeting normal business users, uers with role are technical in nature and tend not to follow these type of instruction, hence I exclude this group of privilege roles users.
17.12.2024 07:28 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0PowerShell Self-Pwn Detection
Proofpoint highlights a social engineering tactic where users are tricked into running malicious PowerShell scripts, leading to malware infections. Despite needing user interaction, the attack's success relies on clever social engineering.
Detecting Teams Red Team Tool ConvoC2
cybersecuritynews.com/red-team-too...
SentinelLab observed threat actor targeting service providers in Southern Europe abusing Visual Studio Code tunnels to maintain persistent remote access to compromised systems. www.bleepingcomputer.com/news/securit... KQL to detect such abuse.
10.12.2024 23:50 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0Detect Black Basta Ransomware Campaign RMMTools Deployment - Social Engineering Attack via Teams where the ransomware operator sends a SharePoint link to user to download portable RMM tools to evade detection from web proxy. www.rapid7.com/blog/post/20...
10.12.2024 05:35 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0Thank you! ๐๐
07.12.2024 09:11 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0The KQL Grimoire ๐
A collection of the most sought-after KQL spells for Microsoft Sentinel and DefenderXDR
www.linkedin.com/pulse/slims-...
๐ก๐ฒ๐ ๐จ๐ฅ๐ ๐๐ถ๐น๐ฒ ๐ก๐ง๐๐ ๐๐ฎ๐๐ต ๐๐ถ๐๐ฐ๐น๐ผ๐๐๐ฟ๐ฒ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐๐ฒ๐๐ฒ๐ฐ๐๐ถ๐ผ๐ป (0๏ธโฃ๐ฑ๐ฎ๐)
A highly accurate DefenderXDR exposure management detection for URL File NTLM Hash Disclosure Vulnerability (0day) www.bleepingcomputer.com/news/securit...
github.com/SlimKQL/Hunt...
02.12.2024 06:01 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0In AD environments, Timeroasting exploits NTP authentication to request password hashes of computer/trust accounts. If non-standard or legacy passwords are used, offline brute-forcing is possible. I've created a KQL query to detect such activities. #KQL #Timeroast
02.12.2024 06:01 โ ๐ 4 ๐ 1 ๐ฌ 2 ๐ 0github.com/SlimKQL/Hunt...
01.12.2024 12:38 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Sharing a Sentinel KQL detection for ShadowHound by Friends-Security, which enhances AD enumeration for security assessments. Beware: it can be misused by threat actors & red teamers for reconnaissance. My KQL rule helps identify and mitigate these risks. #KQL #ShadowHound
01.12.2024 12:37 โ ๐ 5 ๐ 1 ๐ฌ 1 ๐ 0Hunting Rockstar 2FA:
github.com/SlimKQL/Hunt...
Hunting Rockstar 2FA: A Key Player in Phishing-as-a-Service (PaaS)
www.trustwave.com/en-us/resour...
KQL Code:
github.com/SlimKQL/Hunt...
Social Engineering Attack Alert - Teams & Emails
Kevin Beaumont shared insights on helping orgs recover from ransomware attacks. Key tactic: social engineering. Attackers used phone recon to gather contacts, then flooded users with emails & Teams messages. Custom KQL script for early detection:
CloudApp BEC Defense Policy - Axios
Attackers bypass MFA using a phishing framework with Axios HTTP client. Detect compromise in sign-in logs with user agent axios/1.7.7. Proposing auto-detection & isolation for SecOps assessment.
Sources: Asger Deleuran Strunk / Stephan Berger
๐ง๐ต๐ฒ ๐ฃ๐ฒ๐ฟ๐ณ๐ฒ๐ฐ๐ ๐๐๐๐๐ผ๐บ ๐๐ฒ๐๐ฒ๐ฐ๐๐ถ๐ผ๐ป ... ๐
Using CloudApp & Behaviour Analytics to detect malicious threat actor Copilot Agent.
#Cybersecurity #DefenderXDR #CloudApp #CopilotAgent #KQL
Copilot Agent: The Good, the Bad, and the Ugly
www.linkedin.com/pulse/copilo...
KQL can be downloaded from my KQL repository:
github.com/SlimKQL/Hunt...
Phishing by Design: Two-Step Attacks Using .vsdx Files
I have crafted a precise KQL using Microsoft Defender for Office 365 and Endpoint to detect such abuse scenarios.
perception-point.io/blog/phishin...
#Cybersecurity #KQL #Phishing #Evasion #TrustedPlatform