On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 9: Perception vs. ConceptionThe concepts discussed in this post are related to those discussed in the 9th session of the DCP Live podcast. If you find this information interesting, I highly recommend checking the session out!https://medium.com/media/89a600d7731c06c483f9d3c89ddc5ff7/hrefAt this point in the series, we understand that attack techniques are abstract concepts that ... Read More
On Detection: From Tactical to Functional

On Detection: From Tactical to Functional

In his 1931 paper “A Non-Aristotelian System and Its Necessity for Rigour in Mathematics and Physics,” Mathematician Alfred Korzybski introduced an idea that many today find helpful when dealing with complex systems. The idea is commonly referred to as “The map is not the territory,” and Korzybski lays it out ... Read More
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 7: Synonyms“Experience is forever in motion, ramifying and unpredictable. In order for us to know anything at all, that thing must have enduring properties. If all things flow, and one can never step into the same river twice — Heraclitus’s phrase is, I believe, a brilliant evocation of the core reality of ... Read More
On Detection: Tactical to Function

On Detection: Tactical to Function

Part 6: What is a Procedure?Physical reality has structures at all levels of metric size from atoms to galaxies. Within the intermediate band of terrestrial sizes, the environment of animals and men is itself structured at various levels of size. At the level of kilometers, the earth is shaped by ... Read More
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 5: Expanding the Operation GraphWelcome back to the On Detection: Tactical to Functional blog series. Previously we discussed operations and sequences of operations that I call operation paths. This article will explore the idea that there must be one operation path for any given technique or sub-technique, but there ... Read More
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 4: Compound FunctionsIntroductionWelcome back to the On Detection: Tactical to Functional series (links to all posts are at the bottom of the post). Thus far, we’ve explored the OS Credential Dumping: LSASS Memory sub-technique, specifically mimikatz, as an example to understand how this sub-technique works. The first post focused ... Read More
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 3: Expanding the Function Call GraphIntroductionIn the previous post in this series, I introduced the concept of operations and demonstrated how each operation has a function call graph that undergirds it. In that post, I purposely presented incomplete, relative to my knowledge, function call graphs because I wanted only to ... Read More
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 2: OperationsIntroductionWelcome back to my On Detection: Tactical to Functional series. In the first post in this series, we explored the source code for Mimikatz’s sekurlsa::logonPasswords command. We discovered that Mimikatz relies on three Windows APIs to read credentials from the memory of the LSASS process. First, it calls ... Read More
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 1: Discovering API Function Usage through Source Code ReviewWelcome to my new blog series, “On Detection: Tactical to Functional,” where I intend to explore and expand my understanding of that which we attempt to detect. We’ve all operated within the Tactics, Techniques, and Procedures paradigm for so long that I ... Read More
Understanding the Function Call Stack

Understanding the Function Call Stack

There’s more than meets the eye under the function call hoodThis post is based on a September 2021 Twitter thread that I wrote to describe the same concept regarding function calls and their hidden hierarchy. That thread was inspired by a series of tweets by inversecos who shared how malware authors ... Read More