Detection
20 Nov 2023
DEATHcon2023: Practical DEATH by Velociraptor
DEATHcon Velociraptor workshop was held November 2023. I covered practical break down of Velociraptor and VQL, incorporated into real world scenarios.
- Brief introduction to Velociraptor and lab setup
- Available data / VQL accessors
- VQL Performance and Yara.
- ATT&CK Detection use case: RDP patching
- UEFI BlackLotus
- LNK Analysis
13 Sep 2023
Content Management Like a Boss!
Content management is one of the most under rated Velociraptor capabilities used by mature users. This talk will walk through some basics of content management, introduce automation and hopefully leave you with actionable ideas on how to do Velociraptor Content like a boss.
Presentation
5 Nov 2022
DEATHcon 2022 Velociraptor workshop
DEATHcon Velociraptor workshop was held November 2022. We cover some basic VQL use cases including NTFS, Event Logs, Yara and memory artifacts.
The workshop was implemented with Velociraptor 0.6.6 although the data generation can be applied to any version.
Workshop introduction
17 Sep 2022
Notebook and VQL - data munging your way to victory!
Velociraptor notebook is a feature that supercharges analysis and speeds up many components of incident response. New users are often intimidated by advanced VQL and don’t know where to start. This talk aims to shed some light on data manipulation in VQL and provide some practical examples that can be taken away for better artifacts and analysis.
Presentation
12 Jan 2022
WMI Event Consumers: what are you missing?
WMI Eventing is a fairly well known technique in DFIR, however some tools may not provide the coverage you expect. This article covers WMI eventing visibility and detection including custom namespaces.
9 Nov 2021
Cobalt Strike Payload Discovery And Data Manipulation In VQL
Velociraptor’s ability for data manipulation is a core platform capability that drives a lot of the great content we have available in terms of data parsing for artifacts and live analysis. After a recent engagement with less common encoded Cobalt Strike beacons, and finding sharable files on VirusTotal, I thought it would be a good opportunity to walk through some workflow around data manipulation with VQL for analysis. In this post I will walk though some background, collection at scale, and finally talk about processing target files to extract key indicators.
26 Jun 2019
Endpoint Hunting in an AntiEDR World
With the proliferation of EDR we have seen attackers at all levels upping their game to bypass brittle (and not so brittle) endpoint detection. This talk showcases the background to EDR technology and some practical real world examples of detection bypasses.
Originally presented at a local SANs and community event (modification with additional presentations since).
29 May 2019
This is my second Binary Rename post, in this post I am focusing on static detection, that is assessing files on disk. I am going to describe differences between both Yara and Powershell based detections, then share the code.
12 May 2019
Blue Team Hacks - Binary Rename
In this post I thought I would share an interesting proof of concept I developed to detect Binary Rename of commonly abused binaries. Im going to describe the detection, its limitations and share the code.