✞ inversecos🩸(@inversecos) 's Twitter Profile Photo

1\ : How to detect Linux Timestomping

Analyse the entries in these two files:
> filesystem.db
> filesystem.db-wal

Most writeups focus on detecting the use of 'touch'. But you can timestomp without using 'touch'. 😈

Check out my blog below 👇
inversecos.com/2022/08/detect…

1\ #DFIR: How to detect Linux Timestomping

Analyse the entries in these two files:
> filesystem.db
> filesystem.db-wal

Most writeups focus on detecting the use of 'touch'. But you can timestomp without using 'touch'. 😈

Check out my blog below 👇
inversecos.com/2022/08/detect…
account_circle
Justin Bui(@slyd0g) 's Twitter Profile Photo

Just released a post covering timestomping as an anti-forensics technique! I dig into the implementation as well as detections. Big thanks to my team SpecterOps for pushing me to look into defense as well as offense 💜
posts.specterops.io/revisiting-ttp…

account_circle
Taz Wake(@tazwake) 's Twitter Profile Photo

DFIR reminder - files in NTFS have 2+ sets of timestamps (3 sets is normal). This means you have 2 creation times (as shown). Timestomping invariably only changes the first & you can use this.

But be warned - there are tons of false positives here, so it is a bad 'hunt.'

DFIR reminder - files in NTFS have 2+ sets of timestamps (3 sets is normal). This means you have 2 creation times (as shown). Timestomping invariably only changes the first & you can use this. 

But be warned - there are tons of false positives here, so it is a bad 'hunt.'
account_circle
shawi | شاوي(@ShawiTheHunter) 's Twitter Profile Photo

الفرق من ناحية تحقيق جنائي ان $SI ممكن التعديل على اوقاته باستخدام أدوات Timestomping technique اما ال $FN لا توجد الى الان أساليب للتعديل على هذي القيم (موضوع للنقاش اذا كان فيه Signed Malicious Driver؟)

الفرق من ناحية تحقيق جنائي ان $SI ممكن التعديل على اوقاته باستخدام أدوات Timestomping technique اما ال $FN لا توجد الى الان أساليب للتعديل على هذي القيم (موضوع للنقاش اذا كان فيه Signed Malicious Driver؟)
account_circle
Security Compass Advisory(@advisory_sc) 's Twitter Profile Photo

Skillful attackers use to hide malicious files, slowing down detection and response.

Join Kroll on June 15th to learn how to detect timestomping using Kroll Artifact Parser and Extractor ( ).



bit.ly/3LRMvNZ

Skillful attackers use #timestomping to hide malicious files, slowing down detection and response.

Join @KrollWire on June 15th to learn how to detect timestomping using Kroll Artifact Parser and Extractor (#KAPE).

#cyberrisk #cyberthreat

bit.ly/3LRMvNZ
account_circle
Eric Capuano(@eric_capuano) 's Twitter Profile Photo

Did you know Sysmon's event ID 2 can help identify signs of timestomping? Takes some tuning to reduce some FPs, but it's very good at it. Here's an executable that's been timestomped by a CobaltStrike beacon...

Did you know Sysmon's event ID 2 can help identify signs of timestomping? Takes some tuning to reduce some FPs, but it's very good at it. Here's an executable that's been timestomped by a CobaltStrike beacon...
account_circle
Kroll(@KrollWire) 's Twitter Profile Photo

In our new series covering sophisticated anti-forensic tactics, our expert Andrew Rathbun dives into timestomping, how threat actors are using it and how to detect it on a compromised system.

Learn more: bit.ly/3zAJwGW

In our new series covering sophisticated anti-forensic tactics, our #cyberrisk expert Andrew Rathbun dives into timestomping, how threat actors are using it and how to detect it on a compromised system.

Learn more: bit.ly/3zAJwGW

#cyberthreat #cybersecurity
account_circle
Privilege Escalator(@kafkaesqu3) 's Twitter Profile Photo

forensic examiners often look at file create/modify properties when triaging systems to identify suspicious files, so wrote a lil .NET timestomping tool to help you blend in:
github.com/kafkaesqu3/Sha…

account_circle
Kroll(@KrollWire) 's Twitter Profile Photo

In this insightful webinar, our expert Andrew Rathbun demonstrates how to use Kroll Artifact Parser and Extractor ( ), MFTECmd and Timeline Explorer to acquire, parse and analyze an $MFT file to detect .

Watch the replay here: bit.ly/3aiCegS

account_circle
عبدالرحمن الداعج - تقني سيبراني(@A9_4) 's Twitter Profile Photo

أفضل استراتيجية للتحقق من أي ملف اذا كان تم التلاعب فيه من خلال Timestomping هي تطبيق عدة طرق للتحقق وعدم الإعتماد على طريقة واحدة:
1- الطريقة الاولى هي التحقق إذا كان تاريخ Creation Date في $STANDARD_INFORMATION أقدم من Creation Date في $File_NAME
فقد يكون تم التلاعب بتاريخه

أفضل استراتيجية للتحقق من أي ملف اذا كان تم التلاعب فيه من خلال Timestomping هي تطبيق عدة طرق للتحقق وعدم الإعتماد على طريقة واحدة:
1- الطريقة الاولى هي التحقق إذا كان تاريخ Creation Date في $STANDARD_INFORMATION أقدم من Creation Date في $File_NAME
فقد يكون تم التلاعب بتاريخه
account_circle
Vitali Kremez(@VK_Intel) 's Twitter Profile Photo

2021-02-09: 🆕🔥 v2 API “timestomping” ⚙️February 1, 2021 Build
1⃣GetSystemTimeAsFileTime for File Mapping API
2⃣QueueUserAPI Thread Processor

Minor additions to the loader component
cc/ lc4m

2021-02-09: 🆕🔥#Gozi #ISFB v2 API “timestomping” ⚙️February 1, 2021 Build
1⃣GetSystemTimeAsFileTime for File Mapping API
2⃣QueueUserAPI Thread Processor

Minor additions to the loader component
cc/ @luc4m
account_circle
🇮🇱☮️🇺🇦 Balanced Acceleration (b/acc)(@valb00) 's Twitter Profile Photo

Great list of adversarial defense evasion techniques listed. But it’s a logging article after all, so let’s not forget the most obvious TTP of all - log tampering via wiping or timestomping

New The White House CyberSecurity Executive Order mandates log integrity monitoring (Sec8b)

Great list of adversarial defense evasion techniques listed. But it’s a logging article after all, so let’s not forget the most obvious TTP of all - log tampering via wiping or timestomping

New @WhiteHouse CyberSecurity Executive Order mandates log integrity monitoring (Sec8b)
account_circle
Pavel(@sadreck) 's Twitter Profile Photo

Following a feature request, Spartacus v1.2.0 supports:

👉Replication of VERSIONINFO from the original DLL
👉Replication of date created/modified via timestomping

Both are automatically applied when creating a proxy using the --generate-proxy command

github.com/Accenture/Spar…

account_circle
Halil Öztürkci(@halilozturkci) 's Twitter Profile Photo

Anti-forensics tekniklerinden biri olan Timestomping (dosya zamanları üzerinde oynama) nasıl tespit edilir blog.nuix.com/2014/11/19/ide…

account_circle