<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Tristan’s Cybersecurity Substack: SIEM / SOC / MDR]]></title><description><![CDATA[Posts on detection engineering, False Positives reductions, different strategies, basic detection systems knowledge, etc.]]></description><link>https://www.tristandostaler.com/s/siem-soc-mdr</link><image><url>https://substackcdn.com/image/fetch/$s_!j9n6!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65221642-d51c-4583-a96e-a8b1618617b8_1280x1280.png</url><title>Tristan’s Cybersecurity Substack: SIEM / SOC / MDR</title><link>https://www.tristandostaler.com/s/siem-soc-mdr</link></image><generator>Substack</generator><lastBuildDate>Wed, 29 Apr 2026 04:22:24 GMT</lastBuildDate><atom:link href="https://www.tristandostaler.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Tristan Dostaler]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[tristandostaler@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[tristandostaler@substack.com]]></itunes:email><itunes:name><![CDATA[Tristan Dostaler]]></itunes:name></itunes:owner><itunes:author><![CDATA[Tristan Dostaler]]></itunes:author><googleplay:owner><![CDATA[tristandostaler@substack.com]]></googleplay:owner><googleplay:email><![CDATA[tristandostaler@substack.com]]></googleplay:email><googleplay:author><![CDATA[Tristan Dostaler]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Your server is secure? Really?]]></title><description><![CDATA[What to do after you&#8217;ve secured your servers and computers]]></description><link>https://www.tristandostaler.com/p/your-server-is-secure-really</link><guid isPermaLink="false">https://www.tristandostaler.com/p/your-server-is-secure-really</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Fri, 15 Nov 2024 17:10:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!iZsy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>What to do after you&#8217;ve secured your servers and computers</h1><p>You&#8217;ve hardened all you could on your servers or computers, you have a strong password with&nbsp;<a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA</a>, you update regularly or automatically everything and are wondering what can be done next?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iZsy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iZsy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iZsy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg" width="426" height="426" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:426,&quot;width&quot;:426,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image for post&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image for post" title="Image for post" srcset="https://substackcdn.com/image/fetch/$s_!iZsy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Like you probably know, you can never be 100% protected and there is always a way criminals can find to access private information. For those who tells me they are 100% secure, here is an example:</p><p>You have a secure WordPress website at www.mysite.com which has nice plugins to secure it, you maintain it up to date and you have&nbsp;<a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA</a>. You then go in a public cafe to make some changes to your website. You enter your WordPress URL in your browser, get the login window, enter your password + your&nbsp;<a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA&nbsp;</a>and get access to your website. You then make some changes and everything works as normal. Then a few days later your site gets defaced, or worse. What happened?</p><p>What you missed here is that an attacker in the same cafe as you was able to change the IP returned when you did a&nbsp;<a href="https://en.wikipedia.org/wiki/Domain_Name_System">DNS</a>&nbsp;query for your domain (either through&nbsp;<a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack">MITM&nbsp;</a>or by changing the&nbsp;<a href="https://en.wikipedia.org/wiki/Domain_Name_System">DNS&nbsp;</a>Server in the router config). He then redirected you to a new domain: www.rnysite.com. This new domain is owned by the attacker and directs you to a sever that runs&nbsp;<a href="https://github.com/drk1wi/Modlishka">Modlishka</a>. This attacking tool essentially&nbsp;<a href="https://en.wikipedia.org/wiki/Proxy_server">proxies&nbsp;</a>all your traffic to your real website www.mysite.com, even validating your password +&nbsp;<a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA&nbsp;</a>and making the changes you ask for, but he also makes a copy of all the traffic, taking your&nbsp;<a href="https://en.wikipedia.org/wiki/HTTP_cookie">cookies</a>&nbsp;and password. Although he doesn&#8217;t have your&nbsp;<a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA</a>, he now has your&nbsp;<a href="https://en.wikipedia.org/wiki/HTTP_cookie">cookies</a>. Oh and if that&#8217;s not enough,<a href="https://www.unix-ninja.com/p/attacking_google_authenticator">&nbsp;it&#8217;s possible now to brute-force the TOTP seed with Hashcat with only 2 TOTP token</a>. (<a href="https://en.wikipedia.org/wiki/Brute-force_attack">Here is a definition of Brute-force attack</a>)</p><p>So now what?</p><p>Well, here comes logging, aggregating, correlating and alerting &#8212; also known as a&nbsp;<a href="https://en.wikipedia.org/wiki/Security_information_and_event_management">Security Information and Event Management</a>, or SIEM.</p><p>But what is a SIEM? As Varonis puts it:</p><blockquote><p>Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.</p><p>SIEM collects security data from network devices, servers, domain controllers, and more. SIEM stores, normalizes, aggregates, and applies analytics to that data to discover trends, detect threats, and enable organizations to investigate any alerts.</p><p><em>Source:&nbsp;<a href="https://www.varonis.com/blog/what-is-siem/">https://www.varonis.com/blog/what-is-siem/</a></em></p></blockquote><p>&#8230;</p><p>Now that we established what is a SIEM and why it is needed, how to we get started with this?</p><p>Well, to get started using a SIEM, you can read my blog posts on the subject! My goal is to make it easy to understand and accessible to anyone with some IT experience.</p><p>Next post:&nbsp;<a href="https://www.tristandostaler.com/siem-101-introduction/">SIEM 101 &#8212; Introduction</a></p><p>Feel free to leave your comment down here for any questions or comments.</p><h3><strong>Donation</strong></h3><p>If you like my blog and my posts, please consider donating! Imagine this: each minute of reading a post takes about 1-2 hours to create!</p>]]></content:encoded></item><item><title><![CDATA[SIEM 101 — Introduction]]></title><description><![CDATA[In the following days, I&#8217;ll write a few blog posts explaining how to easily learn to use a Security Information and Event Management, or SIEM.]]></description><link>https://www.tristandostaler.com/p/siem-101-introduction</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-101-introduction</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Fri, 15 Nov 2024 17:01:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Pgmv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Pgmv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Pgmv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 424w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 848w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 1272w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Pgmv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp" width="1456" height="639" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:639,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52346,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Pgmv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 424w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 848w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 1272w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the following days, I&#8217;ll write a few blog posts explaining how to easily learn to use a&nbsp;<a href="https://en.wikipedia.org/wiki/Security_information_and_event_management">Security Information and Event Management</a>, or SIEM.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><p>But what is a SIEM? As Varonis puts it:</p><blockquote><p><em>Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.</em></p><p><em>SIEM collects security data from network devices, servers, domain controllers, and more. SIEM stores, normalizes, aggregates, and applies analytics to that data to discover trends, detect threats, and enable organizations to investigate any alerts.</em></p><p>Source:&nbsp;<a href="https://www.varonis.com/blog/what-is-siem/">https://www.varonis.com/blog/what-is-siem/</a></p></blockquote><p>To do this, I wrote the post&nbsp;<a href="https://www.tristandostaler.com/siem-101-initial-setup/">SIEM 101 &#8212; Initial setup</a>&nbsp;where I explain how to create an account on&nbsp;<a href="https://logz.io/">Logz.io</a>; they offer a free account where you can send up to 1 GB / day of logs to try their platform. Time needed: around 2 minutes.</p><p>Still in the post&nbsp;<a href="https://www.tristandostaler.com/siem-101-initial-setup/">SIEM 101 &#8212; Initial setup</a>, I then explain how to send your logs there, whether you&#8217;re on Windows or on Linux. Time needed: around 5&#8211;10 minutes.</p><p>After&nbsp;that, I&#8217;ll explain the basic usage of&nbsp;<a href="https://logz.io/">Logz.io</a>, how to search logs, how to create an alarm, etc. Time needed: around 30 minutes.</p><p>When all this is done, the scene will be in place to start writing blogs on detection cases, for example: receive an alert if Windows is brute forced, receive an alert if a failed logon happened on your WordPress server, etc.</p><p>I&#8217;ll eventually talk about the scripts I developed that uses&nbsp;<a href="https://logz.io/">Logz.io</a>&nbsp;to automatically block bad IPs on my servers.</p><p>For the most advanced users, you&#8217;ll then be able to discover some useful tools the community provides, like the&nbsp;<a href="https://github.com/Neo23x0/sigma">Sigma rules</a>.</p><p>Follow me in my next post:&nbsp;<a href="https://www.tristandostaler.com/siem-101-initial-setup/">SIEM 101 &#8212; Initial setup</a></p><p>Feel free to leave your comment down here for any questions or comments.</p><h3><strong>Donation</strong></h3><p>If you like my blog and my posts, please consider donating! Imagine this: each minute of reading a post takes about 1-2 hours to create!</p>]]></content:encoded></item><item><title><![CDATA[Never receive an alert from Windows Defender? You should!]]></title><description><![CDATA[A few years ago, I was on the defense team when a pentest was ongoing on one of our website.]]></description><link>https://www.tristandostaler.com/p/never-receive-an-alert-from-windows</link><guid isPermaLink="false">https://www.tristandostaler.com/p/never-receive-an-alert-from-windows</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Thu, 14 Nov 2024 20:44:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BNP_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BNP_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BNP_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BNP_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg" width="500" height="365" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:365,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!BNP_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Sometime the reds&nbsp;win&#8230;</figcaption></figure></div><p>A few years ago, I was on the defense team when a pentest was ongoing on one of our website. This website, coded in C#, was hosted on Windows and had Windows Defender activated.</p><p>During the pentest, the attacker had access to the CMS. He discovered that he could upload his own plugins, giving him Remote Code Execution (RCE) on the server. Happy with this discovery, he started his C&amp;C server (it was PowerShell Empire 2 at the time), crafted a payload and launched the result in a C# wrapped plugin and then&#8230; nothing.</p><p>As some of you may know, C#, PowerShell and Defender all love to work together. That&#8217;s because the&nbsp;.NET framework is now tightly integrated with Windows Defender. When sending the payload, Defender could see and block the attack.</p><p>So all the attacker had to do was to modify his payload until it passed all the checks Defender does. After a few hours, he had a complete reverse shell (although restricted to the IIS user).</p><p>From the defense point of view, the fact that Defender did his job is perfect. But the fact that we didn&#8217;t know Defender blocked a file-less attack and we only learned it when we receive the report should be considered a disaster. It means your AV is useless because an attacker has all the time he needs to craft his attack.</p><p>From this point, the next steps where clear, we needed to receive an alert when a virus was detected. And maybe on other suspicious behavior? That&#8217;s when I discovered what is a SIEM!</p><p>If you wan&#8217;t to know more about what is a SIEM and how to use it, you can read my blog posts on the subject starting with:&nbsp;<a href="https://www.tristandostaler.com/siem-101-introduction/">SIEM 101&#8202;&#8212;&#8202;Introduction</a></p><p>Feel free to leave your comment down here for any questions or comments.</p><h3><strong>Donation</strong></h3><p>If you like my blog and my posts, please consider donating! Imagine this: each minute of reading a post takes about 1-2 hours to create!</p>]]></content:encoded></item><item><title><![CDATA[SIEM 101 — Initial setup]]></title><description><![CDATA[In this post, I&#8217;ll explain how to initially setup a SIEM so you can receive your first logs.]]></description><link>https://www.tristandostaler.com/p/siem-101-initial-setup</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-101-initial-setup</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Thu, 14 Nov 2024 15:28:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9KFL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1feada15-be8d-44fb-8752-3d4bc5259943_492x387.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post, I&#8217;ll explain how to initially setup a SIEM so you can receive your first logs.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><div><hr></div><p>This is the second post of the series &#8220;SIEM 101&#8243; where I explain the basics of a SIEM, from installation to simple usage. You can see the previous post&nbsp;<a href="https://www.tristandostaler.com/siem-101-introduction/">SIEM 101&#8202;&#8212;&#8202;Introduction</a>.</p><div><hr></div><p>I decided to write the series using&nbsp;<a href="https://logz.io/">Logz.io</a>&nbsp;because they offer an easy to use platform with a free 1GB/day trial with a smooth learning curve. Of course they don&#8217;t offer all the features in the free version and some crucial features for a SIEM are missing, but this is perfect to get started with a SIEM! For the&nbsp;<a href="https://www.splunk.com/">Splunk</a>&nbsp;fans, I&#8217;ll probably write a blog post about why I don&#8217;t recommend it often and why I recommend an&nbsp;<a href="https://www.elastic.co/what-is/elasticsearch">Elasticsearch</a>&nbsp;based SIEM most of the time.</p>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-101-initial-setup">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SIEM 202 — Detecting remote PsExec]]></title><description><![CDATA[In this post I&#8217;ll explain how to detect an attacker that uses PsExec to connect to your computer when you don&#8217;t have visibility over the attacker&#8217;s computer.]]></description><link>https://www.tristandostaler.com/p/siem-202-detecting-remote-psexec</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-202-detecting-remote-psexec</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Thu, 14 Nov 2024 13:57:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ssF3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3c682f8-e683-4f65-963e-c1a7e7a13082_1901x866.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post I&#8217;ll explain how to detect an attacker that uses PsExec to connect to your computer when you don&#8217;t have visibility over the attacker&#8217;s computer.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><div><hr></div><p>For this post, I assume you&#8217;ve read my&nbsp;<a href="https://www.tristandostaler.com/category/information-technology/infosec/siem/siem-100-series/">SIEM 100 series</a>&nbsp;where I explain the basics of Logz.io. I&#8217;ll be using the stack I created in this series to demonstrate what to do.</p><div><hr></div><p>PsExec is a tool provided by Microsoft in the Sysinternals suite:&nbsp;<a href="https://docs.microsoft.com/en-us/sysinternals/downloads/psexec">https://docs.microsoft.com/en-us/sysinternals/downloads/psexec</a><br>Like they explain:<br>&nbsp;</p><blockquote><p>PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec&#8217;s most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems.</p><p><a href="https://docs.microsoft.com/en-us/sysinternals/downloads/psexec">https://docs.microsoft.com/en-us/sysinternals/downloads/psexec</a></p></blockquote><p>PsExec can be use as an adversary to pivot between computers and/or elevate privileges. It is rather easy to detect when executed on a monitored endpoint, but what happens when a remote computer not monitored use it to connect to a monitored endpoint?</p><p>It turns out it can be detected by looking for a chain of 3 events, distinctive of PsExec behavior when remote connecting.</p>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-202-detecting-remote-psexec">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SIEM 102 — Detect Windows bruteforce]]></title><description><![CDATA[In this post I&#8217;ll explain how to detect a bruteforce on Windows.]]></description><link>https://www.tristandostaler.com/p/siem-102-detect-windows-bruteforce</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-102-detect-windows-bruteforce</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Wed, 13 Nov 2024 15:17:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!X86C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5514351d-d519-4be3-867f-46c172d59229_1281x705.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post I&#8217;ll explain how to detect a bruteforce on Windows. This is a simple case so it&#8217;s a good use case to start learning to create alerts.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><div><hr></div><p>For this post, I assume you&#8217;ve read my&nbsp;<a href="https://www.tristandostaler.com/category/information-technology/infosec/siem/siem-100-series/">SIEM 100 series</a>&nbsp;where I explain the basics of Logz.io. I&#8217;ll be using the stack I created in this series to demonstrate what to do.</p><div><hr></div><h3>Why we need to detect Windows bruteforce</h3><p>When we have a lot of Windows machine in our environment, it can be useful to be able to detect a bruteforce on a machine, be it over <a href="https://en.wikipedia.org/wiki/Remote_Desktop_Protocol">RDP</a> or not. For example, with this Use Case, we could detect an attacker trying to login on a sensitive computer or trying to pivot between machine.</p><p>This Use Case is really simple so it&#8217;s rather easy to develop and test. But it&#8217;s also prone to false positive, so it&#8217;s a good Use Case to learn to reduce the false positives.</p><h3>How</h3>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-102-detect-windows-bruteforce">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SIEM 201 — What is Sysmon]]></title><description><![CDATA[In this post I&#8217;ll explain what is Sysmon, how to install it and how to use it to detect important pattern.]]></description><link>https://www.tristandostaler.com/p/siem-201-what-is-sysmon</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-201-what-is-sysmon</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Wed, 13 Nov 2024 14:41:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!LQlj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c9c15dc-3756-4eb9-8ec6-06a417a7d464_1423x907.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post I&#8217;ll explain what is Sysmon, how to install it and how to use it to detect important pattern.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><div><hr></div><p>For this post, I assume you&#8217;ve read my&nbsp;<a href="https://www.tristandostaler.com/category/information-technology/infosec/siem/siem-100-series/">SIEM 100 series</a>&nbsp;where I explain the basics of Logz.io. I&#8217;ll be using the stack I created in this series to demonstate what to do.</p><div><hr></div><p>Sysmon is a tool provided by Microsoft in the Sysinternals suite:&nbsp;<a href="https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon">https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon.&nbsp;</a>&nbsp;</p><p>Like they explain:</p><blockquote><p><em>System Monitor</em>&nbsp;(<em>Sysmon</em>) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time. By collecting the events it generates using&nbsp;<a href="https://msdn.microsoft.com/library/windows/desktop/bb427443(v=vs.85).aspx">Windows Event Collection</a>&nbsp;or&nbsp;<a href="https://en.wikipedia.org/wiki/security_information_and_event_management">SIEM</a>&nbsp;agents and subsequently analyzing them, you can identify malicious or anomalous activity and understand how intruders and malware operate on your network.</p></blockquote>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-201-what-is-sysmon">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SIEM Solutions 101 — Basic usage]]></title><description><![CDATA[In this post I&#8217;ll explain the basics on using a SIEM: how to search logs and how to send alerts.]]></description><link>https://www.tristandostaler.com/p/siem-101-basic-usage</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-101-basic-usage</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Wed, 13 Nov 2024 13:24:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/06aad0b0-28cb-46b1-8798-8114f746cc84_1488x863.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post I&#8217;ll explain the basics on using a SIEM: how to search logs and how to send alerts.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><div><hr></div><p>This is the third post of the series &#8220;SIEM 101&#8221; where I explain the basics of a SIEM, from installation to simple usage. You can see the previous post&nbsp;<a href="https://www.tristandostaler.com/siem-101-initial-setup/">SIEM 101&#8202;&#8212;&#8202;Initial setup</a>.</p><div><hr></div>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-101-basic-usage">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Information Security synonyms]]></title><description><![CDATA[Information Security, Cybersecurity, IT security, and other synonyms]]></description><link>https://www.tristandostaler.com/p/information-security-synonyms</link><guid isPermaLink="false">https://www.tristandostaler.com/p/information-security-synonyms</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Wed, 13 Nov 2024 13:08:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zuf4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Information Security, Cybersecurity, IT security, and other synonyms</h2><p>Information Security, Cybersecurity, IT security. We&#8217;ve all heard and read them in interchangeable ways, these synonyms all aim to define what is security. But most of them imply assumptions harmful for the Information Security domain. Let me explain.</p><h3>What we try to do</h3><p>Generally, when we, or often the media, use the term &#8220;Cybersecurity&#8221;, we want to describe the idea that we want to be secure against some kind of &#8220;hacker&#8221;. Most people who use this term imagine a &#8220;hacker&#8221;, in a black hoodie, in front of a screen full of green scribble. But this idea misses the point of what really is Security, or as I prefer to say, Information Security, or InfoSec.</p><p>What a bad actor, often named &#8220;hacker&#8221;, really want to do is to gain access to information that he/she wouldn&#8217;t normally have access otherwise to reach a goal.</p><p>In a ransomware attack, the goal is to keep you from having access to this information and extort money from you. In a phishing attack, the goal could be to steal credentials, which is a kind of information, to use them or sell them.</p><p>So once we understand what the bad actor wants, we understand what we need to protect. At the highest level, the goal is Information. Hence the word &#8220;information&#8221; in &#8220;Information Security&#8221;. The security part imply the idea that we want to protect this information against all kind of attacks.</p><h3>Why it&#8217;s a problem</h3><p>The problem with the words &#8220;Cybersecurity&#8221;, &#8220;IT security&#8221; and other similar terms is that they imply that the security must be done at the technology level: the computers, the servers, the firewalls, the switches, etc. While it is important to secure these technologies, the global strategy needs to be way larger.</p><p>For example, no technology can help us against the CEO fraud if an untrain employee falls for it. The problem in this specific case is the lack of training. Training is not a technological solution but it is one of the most effective strategy to protect the business.</p><p>If we try to reduce the security problem to only the technology, we&#8217;ll fail miserably.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zuf4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zuf4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zuf4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg" width="524" height="382" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:382,&quot;width&quot;:524,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Data security vs. the people (in a ring). Cybersecurity vs the people (in a ring).&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Data security vs. the people (in a ring). Cybersecurity vs the people (in a ring)." title="Data security vs. the people (in a ring). Cybersecurity vs the people (in a ring)." srcset="https://substackcdn.com/image/fetch/$s_!Zuf4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Data security vs. The people</figcaption></figure></div><p>The reason these terms are harmful to the domain is that they create this idea in the mind of the leaders that security is an IT problem. So it often falls in the hands of an IT officer, like the CTO. Most businesses don&#8217;t have a CISO, and those who do have him/her under the IT department. I could write a complete post on why this is a bad idea.</p><h3>What should we do</h3><p>This is a business culture problem and this is where we need to start the work. Businesses that invest in a Security culture often thrives even more than the ones that put millions on technologies.</p><p>So it is more than time that we start talking about this domain by naming it &#8220;Information Security&#8220;!</p><p><em>Note: I wrote &#8220;hacker&#8221; between quotes when talking about bad actors because this term became pejorative. Initially, a hacker is only someone who finds a way around some limitations, with good or bad intentions; mostly goods. For example, my reading light is too bright and I can&#8217;t dim it enough; so I put black tape on it to cover about 80% so I get just enough light. That&#8217;s hacking applied to something else than technology. It&#8217;s a ridiculous example to demonstrate my idea.</em></p><p><em>As explained in wikipedia:</em></p><blockquote><p>The controversy is usually based on the assertion that the term originally meant someone messing about with something in a positive sense, that is, using playful cleverness to achieve a goal. But then, it is supposed, the meaning of the term shifted over the decades and came to refer to computer criminals</p><p>Source: <a href="https://en.wikipedia.org/wiki/Hacker">https://en.wikipedia.org/wiki/Hacker</a></p></blockquote><p><em>Note 2: because of the way SEO works, I&#8217;ll hack my way to the top results by placing terms like &#8220;Cybersecurity&#8221; in my blog from time to time &#128521;</em></p><p>Feel free to leave your comment down here for any questions or comments.</p><h3>Donation</h3><p>If you like my blog and my posts, please consider <a href="https://www.paypal.com/paypalme/tristandostaler">donating</a>! Imagine this: each minute of reading a post takes about 1-2 hours to create!</p>]]></content:encoded></item><item><title><![CDATA[SIEM 102 — Detect WordPress bruteforce]]></title><description><![CDATA[Why we need to detect WordPress bruteforce attack]]></description><link>https://www.tristandostaler.com/p/siem-102-detect-wordpress-bruteforce</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-102-detect-wordpress-bruteforce</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Tue, 12 Nov 2024 15:52:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6ZP2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b03deed-a088-4c67-9bea-c5139577e708_1024x571.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Why we need to detect WordPress bruteforce attack</h2><p>WordPress is one of the most popular CMS and website server in the world. It handles &#8220;<a href="https://techjury.net/blog/percentage-of-wordpress-websites/">more than 30%</a>&#8221; of the websites on the internet. Because of this, bad actors are really interested in finding ways to get control of them.</p><p>One of the most easy way for them to achieve this is by bruteforcing the login for common username and password combinaisons, including from past leaks. This is a working strategy because by default WordPress doesn&#8217;t protect against bruteforce attacks.</p><h2>How do we detect a WordPress bruteforce attack</h2><p>In the WordPress world, there are many ways to handle bruteforce attacks, as this is rather simple to detect. But because we are in the SIEM series, I&#8217;ll talk about how to detect the attack using a SIEM.</p>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-102-detect-wordpress-bruteforce">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SIEM 103 — Detect Windows bruteforce part 2]]></title><description><![CDATA[SIEM 103 &#8212; Detect Windows bruteforce part 2]]></description><link>https://www.tristandostaler.com/p/siem-103-detect-windows-bruteforce-part-2-91ecfba015c1</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-103-detect-windows-bruteforce-part-2-91ecfba015c1</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Sat, 04 Jun 2022 00:40:01 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7178a253-dcfd-4900-8bda-143c0ff22afc_641x360.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>SIEM 103&#8202;&#8212;&#8202;Detect Windows bruteforce part&nbsp;2</h3><p>This post is a follow up of the post <a href="https://www.tristandostaler.com/siem-102-detect-windows-bruteforce/">SIEM 102&#8202;&#8212;&#8202;Detect Windows bruteforce</a> where I explained how to create a detection Use Case to detect a Windows bruteforce.</p><p>In this post I will explain how we can enhance the original detection logic by having a lower False Positive&nbsp;rate.</p><p>As I explained in the last section of the initial post, it is important to manage False Positives (FP). In the past few months, I spent some time to look for ways to reduce FP and this post will summarize them.</p>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-103-detect-windows-bruteforce-part-2-91ecfba015c1">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Why I switched from Logz.io to Humio]]></title><description><![CDATA[I have posted a few articles about SIEMs and I have all done them using Logz.io for my examples.]]></description><link>https://www.tristandostaler.com/p/why-i-switched-from-logz-io-to-humio</link><guid isPermaLink="false">https://www.tristandostaler.com/p/why-i-switched-from-logz-io-to-humio</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Fri, 28 Jan 2022 14:20:31 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c1d740cf-ec9b-46ee-b99b-17b3473a0152_1150x779.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I have posted a few articles about SIEMs and I have all done them using Logz.io for my examples. I recently switched to Humio and transferred all the logs and automations I have. In this post I explain why I did this transfer.</p><p>Here are the posts I did using Logz.io for my examples:</p><ul><li><p><a href="https://www.tristandostaler.com/siem-101-introduction/">https://www.tristandostaler.com/siem-101-introduction/</a></p></li><li><p><a href="https://www.tristandostaler.com/siem-101-initial-setup/">https://www.tristand&#8230;</a></p></li></ul>
      <p>
          <a href="https://www.tristandostaler.com/p/why-i-switched-from-logz-io-to-humio">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>