Homepage
Open in app
Sign in
Get started
FalconForce
A team of highly specialized security professionals
Follow
Debugging the undebuggable and finding a CVE in Microsoft Defender for Endpoint
Debugging the undebuggable and finding a CVE in Microsoft Defender for Endpoint
At FalconForce, we like to understand the tools that we work with. One of the tools we use a lot on the blue side is MDE: Microsoft…
Gijs Hollestelle
Apr 1, 2022
Microsoft Defender for Endpoint Internals 0x02 — Audit Settings and Telemetry
Microsoft Defender for Endpoint Internals 0x02 — Audit Settings and Telemetry
In the previous article of this series, I’ve put Microsoft Defender for Endpoint (MDE) next to Sysmon and highlighted some of the…
Olaf Hartong
Jul 1, 2022
BOF2shellcode — a tutorial converting a stand-alone BOF loader into shellcode
BOF2shellcode — a tutorial converting a stand-alone BOF loader into shellcode
TL;DR — At FalconForce we love purple teaming, meaning that we engage in both red teaming and blue teaming. For the red teaming we often…
Gijs Hollestelle
Nov 5, 2021
Automating the enumeration of missing reply URLs in Azure multitenant apps
Automating the enumeration of missing reply URLs in Azure multitenant apps
TL;DR In my previous blog post, I showed the impact that an unregistered reply URL can have in an Azure tenant and how to enumerate them…
Arnau Ortega
Jul 23
FalconFriday — Detecting MMC abuse using “GrimResource” with MDE — 0xFF24
FalconFriday — Detecting MMC abuse using “GrimResource” with MDE — 0xFF24
Last week, Elastic Security Labs released a blog post detailing the “GrimResource” technique used by both red teams and malicious actors…
Gijs Hollestelle
Jun 28
Arbitrary 1-click Azure tenant takeover via MS application
Arbitrary 1-click Azure tenant takeover via MS application
In this blog post I explain how reply URLs in Azure Applications can be used as a vector for phishing.
Arnau Ortega
Apr 26
SOAPHound — tool to collect Active Directory data via ADWS
SOAPHound — tool to collect Active Directory data via ADWS
SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the …
Nikos Karouzos
Jan 26
FalconHound, attack path management for blue teams
FalconHound, attack path management for blue teams
Recently at Wild West Hackin Fest, I spoke about a powerful new tool we’ve been working hard on and now is available to the public…
Olaf Hartong
Nov 10, 2023
Microsoft Defender for Endpoint Internals 0x05 — Telemetry for sensitive actions
Microsoft Defender for Endpoint Internals 0x05 — Telemetry for sensitive actions
In the previous edition of this series I discussed the Timeline telemetry. Since that blog the amount of events has certainly grown. I’ve…
Olaf Hartong
Oct 13, 2023
Leg ups: helping hand or red team failure?
Leg ups: helping hand or red team failure?
Red teaming exercises are an excellent means to identify gaps in the security controls and test the detection and response capabilities of…
Givan Kolster
Sep 12, 2023
FalconFriday — Automating acquisition for incident response!
FalconFriday — Automating acquisition for incident response!
Releasing ParrotForce to help you fly high even when your systems are down
Nikos Mantas
Jun 16, 2023
Deploying Detections at Scale — Part 0x01 use-case format and automated validation
Deploying Detections at Scale — Part 0x01 use-case format and automated validation
At FalconForce, we have built a large repository of over 350 detection queries. A question we get asked a lot is: “how do you manage and…
Gijs Hollestelle
Mar 13, 2023
Microsoft Defender for Endpoint Internals 0x04 — Timeline
Microsoft Defender for Endpoint Internals 0x04 — Timeline
The MDE timeline has information which is not available in the advanced hunting interface and vice versa. Don’t be blind sighted.
Olaf Hartong
Feb 10, 2023
FalconFriday — Using public intelligence feeds to improve detections — 0xFF22
FalconFriday — Using public intelligence feeds to improve detections — 0xFF22
Today, we will look at how to incorporate public datasets to improve our detections. We will create Sentinel watchlists, build rules…
Jos van der Peet
Dec 16, 2022
FalconFriday — Detecting Active Directory Data Collection — 0xFF21
FalconFriday — Detecting Active Directory Data Collection — 0xFF21
Active Directory data collection
Gijs Hollestelle
Nov 11, 2022
FalconFriday — Detecting ADCS web services abuse — 0xFF20
FalconFriday — Detecting ADCS web services abuse — 0xFF20
One of the popular attack vectors against ADCS is ESC8 — relaying NTLM creds to the ADCS HTTP(S) endpoints. While preventing this…
Henri Hambartsumyan
Oct 14, 2022
FalconFriday — Detecting LSASS dumping with debug privileges — 0xFF1F
FalconFriday — Detecting LSASS dumping with debug privileges — 0xFF1F
Credential dumping from Local Security Authority Subsystem Service (LSASS)
Olaf Hartong
Sep 16, 2022
Microsoft Defender for Endpoint Internals 0x03 — MDE telemetry unreliability and log augmentation
Microsoft Defender for Endpoint Internals 0x03 — MDE telemetry unreliability and log augmentation
In part one and part two of this series, we have established that Microsoft Defender for Endpoint (MDE) uses sampling and caps on events…
Olaf Hartong
Jul 8, 2022
FalconFriday — Detecting UnPACing and shadowed credentials— 0xFF1E
FalconFriday — Detecting UnPACing and shadowed credentials— 0xFF1E
When playing around with Certipy and Rubeus in a recent project, I got into the rabbit hole. Going through the attacks implemented in…
Henri Hambartsumyan
Jun 17, 2022
FalconFriday — Detecting malicious modifications to Active Directory — 0xFF1D
FalconFriday — Detecting malicious modifications to Active Directory — 0xFF1D
Recently, we are seeing more and more threat actors and red teams move to using relay attacks, often combined with the ability of users to…
Gijs Hollestelle
May 13, 2022
EzETW — Got To Catch Them All…
EzETW — Got To Catch Them All…
This post will present the EzETW tool and go over basic Windows events PowerShell cmdlet syntax.
SadProcessor
Mar 11, 2022
FalconFriday — Detecting realistic AWS cloud-attacks using Azure Sentinel — 0xFF1C
FalconFriday — Detecting realistic AWS cloud-attacks using Azure Sentinel — 0xFF1C
On January 28th, Christophe Tafani-Dereeper released the open source Stratus Red team attack simulation tool. At FalconForce, we are very…
Gijs Hollestelle
Feb 11, 2022
FalconFriday — Suspicious named pipe events — 0xFF1B
FalconFriday — Suspicious named pipe events — 0xFF1B
TL;DR for blue teams: Attackers use named pipes to conveniently move laterally and mostly bypass detection. This blog post shows a method…
Olaf Hartong
Jan 14, 2022
FalconFriday —Monitoring for public shares — 0xFF1A
FalconFriday —Monitoring for public shares — 0xFF1A
In this blog we will explore the possibilities to use Microsoft Sentinel to monitor a windows environment for the creation of public…
Jos van der Peet
Dec 17, 2021
FalconFriday — Code execution through Microsoft SQL Server and Oracle Database — 0xFF19
FalconFriday — Code execution through Microsoft SQL Server and Oracle Database — 0xFF19
In this blog we will discuss how you can detect abuse of these code execution features of Microsoft and Oracle databases…
Jos van der Peet
Nov 26, 2021
Sysmon vs Microsoft Defender for Endpoint, MDE Internals 0x01
Sysmon vs Microsoft Defender for Endpoint, MDE Internals 0x01
It is not a big secret that we at FalconForce work a lot with, and are big fans of, both Microsoft Defender for Endpoint (MDE) and…
Olaf Hartong
Oct 15, 2021
FalconFriday — Stealing and detecting Azure PRT cookies — 0xFF18
FalconFriday — Stealing and detecting Azure PRT cookies — 0xFF18
TL;DR: This post outlines a way to bypass the default detection in MDE and how to detect this bypass.
Henri Hambartsumyan
Oct 1, 2021
FalconFriday — Detecting ASR Bypasses — 0xFF17
FalconFriday — Detecting ASR Bypasses — 0xFF17
TL;DR: Today’s blog is about detection of a bypass for the ASR rule “Block Office applications from creating executable content”…
Henri Hambartsumyan
Sep 10, 2021
About FalconForce
Latest Stories
Archive
About Medium
Terms
Privacy
Teams