Wietze's Avatar

Wietze

@wietzebeukema.nl

Threat Detection & Response. Interested in cyber security, tech and politics. Views are my own, unless retweeted.

174
Followers
60
Following
38
Posts
15.12.2024
Joined
Posts Following

Latest posts by Wietze @wietzebeukema.nl

Post image
09.03.2026 12:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

Yet another LNK spoofing flaw: executes any DLL, including remote via WebDAV. Even worse, without Feb 2026 updates, MotW will be ignored.

Next to updating, your best defence is to look for RunDLL32+Shell32+Control_RunDLL with non-standard targets.

See how this works on github.com/wietze/lnk-i...

09.03.2026 12:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

TIL from @wietzebeukema.nl 🀯

13.02.2026 18:16 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Try the tool for yourself: github.com/wietze/lnk-i... πŸ”—

13.02.2026 00:25 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

Can LNK files ever be trusted?

⚑ My latest blog post demonstrates several new LNK abuse methods, allowing you to fully spoof the target shown in Explorer. It also introduces a tool to create your own LNKs, and a tool to detected spoofed ones yourself.

🐬 www.wietzebeukema.nl/blog/trust-m...

13.02.2026 00:25 πŸ‘ 3 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Post image

Video demo to play with ArgFuscator -- the super cool research and utility from @Wietze to obfuscate command-lines to try and evade AV or EDR detection 😎 And to test your rules if any of these crazy looking commands fly under the radar! youtu.be/6-Gbv0h7m1I

11.07.2025 13:01 πŸ‘ 7 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Video thumbnail

As June comes to an end, so does #HuntingTipOfTheDay. I hope you enjoyed them!

πŸ‘‰ Find all of them here: bsky.app/search?q=fro...

30.06.2025 08:02 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

#HuntingTipOfTheDay: you know how to spot/decode Base64 or XOR in PowerShell… but what about SecureString? This AES-based encryption is native to PowerShell; attackers have been seen to use this for PowerShell obfuscation.

πŸ” Hunt for known SecureString decoding commands

27.06.2025 09:01 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

#HuntingTipOfTheDay: Stuck in vi/vim? Open a reverse shell to exit remotely πŸ™ƒ

Not just a joke - you can make vi/vim run arbitrary commands, not all methods to do so are well detected.
πŸ” Hunt for child processes of vi(m), especially those that are rare in your environment.

26.06.2025 09:02 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image Post image

#HuntingTipOfTheDay: there are numerous open-source projects listing cyber threats. Some of these have directly ingestible indicators, which can be very helpful when threat hunting. How about:
πŸ”΅ lots-project.com + LOLBINs
🟠 hijacklibs.net + DLL write events
🟒 lolrmm.io + DNS requests

25.06.2025 09:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

#HuntingTipOfTheDay: AppleScript via osascript is still a popular way for infostealers to get credentials/escalate access. Although some (poorly coded) updaters use this ""legitimately"", hunting for osascript referencing password dialogs might surface behaviour of interest.

24.06.2025 09:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

#HuntingTipOfTheDay: USB worms are still a thing - often the initial infection happens when a user clicks a malicious shortcut on a USB device. See if you can correlate executions with .LNK files on remote drives to find possible badness.

23.06.2025 12:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

#HuntingTipOfTheDay: proxy execution via ComputerDefaults.exe by setting this registry key; as it auto-elevates, it also allows for UAC bypass (!).
πŸ”΄ Executing parent is usually explorer.exe, making detection harder
πŸ” Hunt for reg changes to this key
πŸ‘‰ lolbas-project.github.io/lolbas/Binar...

20.06.2025 12:03 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

#HuntingTipOfTheDay: Florian is right.
🌩️ Cloud creds often linger in Environment Variables, especially on servers/dev machines
🟠 One compromised endpoint could thus lead to a full cloud breach
πŸ” Hunt for exposed tokens - if you can see it, so could an attacker (well, kinda)

19.06.2025 11:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

#HuntingTipOfTheDay: Oddvar Moe of @trustedsec.com shows how you can run a full C2 implant from Outlook - just setting a few registry keys does the trick.

Any activity concerning these registry keys should be consider suspicious.

Full story here: youtu.be/7MDHhavM5GM

18.06.2025 11:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Threat of TCC Bypasses on macOS - AFINE - digitally secure TCC on macOS isn't just an annoying promptβ€”it's the last line of defense between malware and your private data. Read this article to learn why.

Read more: afine.com/threat-of-tc...

17.06.2025 11:06 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

#HuntingTipOfTheDay: TCC on macOS can be bypassed by triggering Electron apps' Node.js interface to run arbitrary commands
⚑ By using a Launch Daemon, you can leverage all the app's TCC permissions
πŸ” Hunt for processes with ELECTRON_RUN_AS_NODE env var and unusual command lines

17.06.2025 11:06 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

#ThreatHuntingTipOfTheDay: rundll32 can be abused in many ways lolbas-project.github.io#t1218.011

Instead of exports, ordinals can be used too. You could hunt for known bad ones, but are ordinals used legitimately that often at all?

Look for rundll32 with # on the command line to find out

16.06.2025 09:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

UAC bypass can be achieved by eg moving the legit perfmon.exe and a malicious atl.dll to "c:\windows \system32". Windows is tricked into thinking this is a safe/trusted directory, meaning perfmon will launch with high integrity and your DLL will be loaded. Several other executables are vulnerable!

13.06.2025 12:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

#HuntingTipOfTheDay: folders with trailing spaces can be created on Windows, and they cause trouble:
πŸ”΄ Hard to delete/rename
🟠 Can hide (malicious) content when the same folder without trailing space exists
🟑 May enable UAC bypass (see next msg)

πŸ” Hunt for paths with trailing spaces - highly sus

13.06.2025 12:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
A lesson in shortcuts - Rob Pike

Bonus background reading: why do hidden files start with a dot on Linux?

πŸ’  glenda.0x46.net/articles/dot...

12.06.2025 09:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

#HuntingTipOfTheDay: you’ll know that in Linux, files with a leading dot are hidden by default. Attackers may use this to hide payloads or frustrate forensics. Although sometimes used legitimately, you may find unexpected entries when looking for EXECUTIONS of hidden files.

12.06.2025 09:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

#HuntingTipOfTheDay: a personal favourite, command-line obfuscation. Substituting or inserting special Unicode characters might allow attackers to bypass string-based detections. Look for command lines with unusual Unicode characters. Checkout ArgFuscator.net for more fun!

11.06.2025 09:02 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

#HuntingTipOfTheDay: macOS has a built-in SSH mechanism that is disabled by default. Would you detect it if someone enables it and logs in remotely? Look for remote login events, and investigate the associated session.

10.06.2025 09:02 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Save the Environment (Variable) By manipulating environment variables on process level, it is possible to let trusted applications load arbitrary DLLs and execute malicious code. This post lists nearly 100 executables vulnerable to…

More about this technique: www.wietzebeukema.nl/blog/save-th...

09.06.2025 11:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

#HuntingTipOfTheDay: Services can provide persistence. Looking for changes to their commands is common, but the lesser known Environment setting is often overlooked. It could result in stealthy DLL hijacking. Inspect any paths referenced for suspicious files.

09.06.2025 11:03 πŸ‘ 3 πŸ” 2 πŸ’¬ 2 πŸ“Œ 0
Post image Post image

#HuntingTipOfTheDay: explorer.exe /root,"c:/your/executable.exe" will spawn your exe from the main explorer.exe, not a new one. This breaks normal process chains. Hunt for explorer.exe with "/root", as well as explorer spawning unusual children (e.g. rundll32, mshta, powershell).

06.06.2025 11:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

#HuntingTipOfTheDay: a common way to execute malicious code on Linux is to download a script via curl/wget and pipe the result into a shell process like bash. Hunt for curl/wget executions followed by an interactive shell within seconds, both having the same parent process.

05.06.2025 10:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

#HuntingTipOfTheDay: You have probably heard of .bash_profile and .zshrc, but are you familiar with PowerShell's version of it? Attackers might use this for persistence; monitor modifications of profiles by unexpected processes, and analyse existing files for anomalies.

04.06.2025 10:02 πŸ‘ 3 πŸ” 2 πŸ’¬ 3 πŸ“Œ 0
Post image Post image

#ThreatHuntingTipOfTheDay: Malicious DMGs/PKGs are currently the most popular way for macOS infostealers to get foothold. Use macOS’s kMDItemWhereFroms extended attribute to see origins of downloaded DMG/PKGs; investigate ones that are rare across your IT estate.

03.06.2025 09:01 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0