CraigHRowland Profile Banner
Craig Rowland - Agentless Linux Security Profile
Craig Rowland - Agentless Linux Security

@CraigHRowland

Followers
9K
Following
3K
Statuses
4K

Agentless Linux security. No endpoint agents and no drama. Discuss Linux malware, forensics, intrusion detection, and hacking. Founder @SandflySecurity.

Christchurch City, New Zealand
Joined October 2018
Don't wanna be here? Send us removal request.
@CraigHRowland
Craig Rowland - Agentless Linux Security
7 days
@0xSkeletonKey Cherry and Lemon.
0
0
1
@CraigHRowland
Craig Rowland - Agentless Linux Security
10 days
@THunter_0x0 @muddletoes It is very common for attackers to search for private keys once the compromise a host and then use those credentials to move further. I discuss this threat here:
0
0
1
@CraigHRowland
Craig Rowland - Agentless Linux Security
10 days
@THunter_0x0 I think that short-lived SSH certs are best. Followed by pub/private key. Passwords only as a last resort if that's all you can do, but they do put credentials at risk.
0
0
1
@CraigHRowland
Craig Rowland - Agentless Linux Security
10 days
@solardiz @Chick3nman512 In principle I'd agree here, but in practice I'd rather Linux users use yescrypt if it is an option vs. others. I should update this list with some caveats.
0
0
0
@CraigHRowland
Craig Rowland - Agentless Linux Security
10 days
@Chick3nman512 In principle I'd agree and should update my list. The main reason I ordered it this way is there are many variants of this hashing method so how to give guidance? I think I'd rather have people move to yescrypt if it is an option on Linux vs. others.
0
0
0
@CraigHRowland
Craig Rowland - Agentless Linux Security
12 days
Once again I say that in my nightmares I wake up after an auto accident in the hospital. I turn my head and see my morphine drip has a Wifi Enabled sticker on it and I scream out into the void.
@BleepinComputer
BleepingComputer
12 days
Backdoor found in two healthcare patient monitors, linked to IP in China - @LawrenceAbrams
0
1
14
@CraigHRowland
Craig Rowland - Agentless Linux Security
12 days
This router was way ahead of its time. Kept so much bad traffic from entering the perimeter of networks that used it.
@csoandy
Andy Ellis
12 days
No one: “Really, Andy, how old can your network really be?” Me: (giving @CraigHRowland and @rsnbrgr nightmares)
Tweet media one
2
1
12
@CraigHRowland
Craig Rowland - Agentless Linux Security
12 days
@csoandy @rsnbrgr When the IDS evasion paper came out it was kind of a yawn for us because we just didn't think many of the attacks would even make it past the perimeter of customers with these.
1
0
2
@CraigHRowland
Craig Rowland - Agentless Linux Security
12 days
@Dave_Maynor Too late. Many are already set to that.
0
0
1
@CraigHRowland
Craig Rowland - Agentless Linux Security
12 days
@csoandy @rsnbrgr I love that there is still one around!
0
0
2
@CraigHRowland
Craig Rowland - Agentless Linux Security
12 days
@stewart_sec This, plus machine to machine scripts, backups, etc. It's a big issue.
0
1
1
@CraigHRowland
Craig Rowland - Agentless Linux Security
12 days
@szarka I haven't seen DES in ages!
1
0
0
@CraigHRowland
Craig Rowland - Agentless Linux Security
12 days
If you find systems with obsolete Linux password hashes, chances are high other problems are lurking. It's like finding sawdust near your house foundation. You can't see the termites, but you know the house has trouble.
Tweet media one
Tweet media two
0
2
5
@CraigHRowland
Craig Rowland - Agentless Linux Security
12 days
@0xSkeletonKey A classic. Pop the box, then wait for someone to login. Rinse and repeat.
0
0
2
@CraigHRowland
Craig Rowland - Agentless Linux Security
12 days
@EricChennells Automated scripts can go around spraying passwords also.
0
0
1
@CraigHRowland
Craig Rowland - Agentless Linux Security
13 days
@0xvaeed I understand. Hashes/binary search is fine for rapid triage. But I just don't think think it's a good long-term approach.
1
0
0
@CraigHRowland
Craig Rowland - Agentless Linux Security
14 days
I suggest breaking down malware into the tactics they use and search for the tactics vs. specific malware signatures. Adding yara rules searching for binaries is never the correct answer. PS. I've never written a Yara rule in my entire career and don't intend to start.
@0xvaeed
nohup
14 days
@CraigHRowland Nice technics for by pass the IOC check but what can we do except checking hash and yara rules for finding same malware in a Network which doesn't have any log management and SOC?
1
1
17