Practical Hacking | infernux
A concise overview of the Practical Hacking guide and quick links to every chapter.
Back in 2018 I attended a hacking courses by a colleague that pretty much put me on the path I am today with work. I got to help teach and in the end write a book on getting started with hacking - I still recommend it to everyone that wants to get into practical security: infernux.no/practical-ha...
10.01.2026 18:51
π 0
π 0
π¬ 0
π 0
Could you build a simple C2-framework using World of Warcraft | infernux
Yes. Sort of, at least. Join me to explore how we can potentially use WoW and it's ecosystem as a C2
Is it possible to make a C2-framework using World of Warcraft? Of course, if you put in some goodwill. If you want you can read about it here:
infernux.no/blog/wowc2/
Fair warning - It's purely for my own sake that I wrote this, you likely won't learn anything exciting by reading.
10.01.2026 17:52
π 0
π 0
π¬ 0
π 0
Today's unfortunate discovery: Microsoft Sentinel summary rules is not supported by Azure Lighthouse.
You need Sentinel Contributor (on the workspace/RG) and log analytics contributor directly on the workspace, which is not supported.
A tiny bit annoying.
08.10.2025 07:14
π 1
π 0
π¬ 0
π 0
Looking forward to next week - I'm speaking at @wpninjas.no on one of my favorite topics, configuring Microsoft Sentinel (and making a couple of mistakes along the way).
06.06.2025 18:14
π 0
π 0
π¬ 0
π 0
- Using Invoke-RestMethod works with an access token for everything
- If you create detection rules in the UI and pull them as code, impacted assets are empty (this is a required field for pushing)
- If you create the rule from the API, impacted assets is returned normally
2/2
02.06.2025 08:15
π 0
π 0
π¬ 0
π 0
Defender XDR - Custom Detection Rules Push/Pull via API
A little primer to pushing and pulling new content via the graph beta API
Finally got out of not writing anything - decided to spend a few hours to play with the custom detection rule api in Defender XDR.
www.infernux.no/DefenderXDR-...
Some funny things I noticed:
- GET works using Invoke-MgGraphRequest
- POST/PATCH throws internal error 500 no matter what
1/2
02.06.2025 08:15
π 0
π 0
π¬ 1
π 0
π Season 2 of #TalkingSecurity MVP Security Insights is LIVE!Β ποΈπ₯
Weβre kicking off with aΒ bang and who better to launch the new season than the brilliantΒ @truls.infernux.no, Microsoft Security MVP and master of all thingsΒ cloud security, SIEM, and EDR! π
talkingsecurity.nl/podcast/secu...
24.04.2025 15:40
π 1
π 1
π¬ 0
π 0
pwshuploadindicatorsapi 1.0.2
This module helps convert MISP events and attributes to the Upload Indicators API format, and then uploads the indicators to the API.
Working on a new #MISP - #Sentinel function app flow using powershell and had to update my pwshuploadindicatorsapi function at the same time - now v1.0.2. Added support for the new Stix Object API (new default) and the old upload indicators API.
www.powershellgallery.com/packages/pws...
#MVPBuzz
08.03.2025 10:43
π 2
π 0
π¬ 0
π 0
pwshmisp 1.0.3
This module is a collection of functions to help with communication with the MISP API.
Just updated #pwshmisp to version 1.0.3.
Releasenotes:
- Fixed typo in Invoke-MISPAttributeSearch
- Added support for enforceWarninglist in filters
- Removed notTags and notOrgs (not supported)
www.powershellgallery.com/packages/pws...
03.03.2025 08:38
π 0
π 0
π¬ 0
π 0
Expanding on Cyber Threat Intelligence for Security Monitoring
Three levels of detection engineering using Threat Intelligence as our guiding light
New blog post - writing a bit about using CTI not only as a data point but as information and context for information in our processes, such as detection engineering (as an example).
www.infernux.no/Expanding-on...
I think the learning points can be transferred to any discipline in security!
26.01.2025 12:16
π 2
π 0
π¬ 0
π 0
pwshuploadindicatorsapi 1.0.1
This module helps convert MISP events and attributes to the Upload Indicators API format, and then uploads the indicators to the API.
Following up my last module pwshmisp with another one, www.powershellgallery.com/packages/pws... - it's a function built to work with pwshmisp to convert data from MISP to the upload indicators API that is used for ingesting TI into MS Sentinel.
#MISP #MicrosoftSentinel #ThreatIntelligence
27.12.2024 10:27
π 0
π 0
π¬ 1
π 0
pwshmisp 1.0.2
This module is a collection of functions to help with communication with the MISP API.
Just released a new tool, pwshmisp - a powershell module for communicating with a #MISP server.
Grab it on www.powershellgallery.com/packages/pws... and contribute over on Github if you find any issues github.com/lnfernux/pws...
I'm also in the process of publishing another module so stay tuned!
25.12.2024 18:15
π 2
π 2
π¬ 0
π 0
Security Monitoring - Threat Modeling and Data Sources
One of the most misunderstood aspects of security monitoring is determining what data sources to use for what purpose. In this post, we will go through the process of determining what data sources to ...
A little feedback request. I've written mostly non-technical lately, tried to focus on how to do something rather than giving out scripts and templates.
Example being this article:
www.infernux.no/SecurityMoni...
My question; what do you like to read, when it comes to tech-related blogs?
25.11.2024 11:24
π 1
π 0
π¬ 1
π 0
Do you need AI for Security? Maybe. Still need to protect it if the rest of org has Copilot.
Exposure Management is now GA, which is really neat and a great tool for everyone. One presentation called DFC a CISO dashboard which is wild.
I'll rate it π/10, not quite π₯/10 but still alright. 2/2
25.11.2024 11:21
π 1
π 0
π¬ 0
π 0
My initial thoughts after attending #MSIgnite this past week; a lot of cool stuff regarding AI. The implications are basically that AI will be more available (create your own agent using natural language), so securing our AI deployments will be more important than ever. 1/2
25.11.2024 11:17
π 1
π 0
π¬ 1
π 0