<?xml version="1.0" encoding="UTF-8"?>
<!--Generated by Site-Server v@build.version@ (http://www.squarespace.com) on Thu, 16 Apr 2026 23:41:47 GMT
--><rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://www.rssboard.org/media-rss" version="2.0"><channel><title>Malware Archaeology</title><link>https://www.malwarearchaeology.com/</link><lastBuildDate>Tue, 19 Nov 2024 15:14:51 +0000</lastBuildDate><language>en-US</language><generator>Site-Server v@build.version@ (http://www.squarespace.com)</generator><description><![CDATA[<p>Malware Discovery and Analysis, Consulting, Training and resources to help in Malware Management</p>]]></description><item><title>New AV Cheat Sheet from Florian Roth</title><dc:creator>HackerHurricane</dc:creator><pubDate>Fri, 22 Nov 2024 23:09:45 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2024/11/19/new-av-cheat-sheet-from-florian-roth</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:673cab6bb12e796bb4832184</guid><description><![CDATA[<p class="">I am always looking for sources of information to improve logging and data to create queries and alerts for a security tools such as an EDR or  SIEM/Log Management solution.</p><p class="">I came across this post from Florian Roth who has created an “<strong><em>Antivirus Event Analysis Cheat Sheet</em></strong>“ that lists Attributes and Relevancy of the types of AV items.  You can find the PDF here:</p><ul data-rte-list="default"><li><p class=""><a href="https://www.nextron-systems.com/wp-content/uploads/2024/11/Antivirus_Event_Analysis_CheatSheet_1.14.0.pdf" target="_blank">https://www.nextron-systems.com/wp-content/uploads/2024/11/Antivirus_Event_Analysis_CheatSheet_1.14.0.pdf</a></p></li></ul><p class="">These types of things are a good place to see if your Security Tooling can detect and/or an Alert/Query can be created to see if ‘bad fu’ is happening in your environment.</p><p class="">You can use this data to create lookup lists or execution locations for a SIEM, or add folders to be monitored with auditing rules that the “<a href="https://www.malwarearchaeology.com/cheat-sheets" target="_blank"><strong><em>Windows File/Folder Auditing Cheat Sheet</em></strong></a>” contains to watch for creations and/or deletes of new files in folders you want to monitor. </p><p class="">Happy Hunting!</p>]]></description></item><item><title>New EDR Telemetry Project released</title><dc:creator>HackerHurricane</dc:creator><pubDate>Sat, 09 Nov 2024 16:48:00 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2024/11/9/new-edr-telemetry-project-released</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:672f80ea41861437b85b11e5</guid><description><![CDATA[<p class="">Kostas has created this project to help people do some comparisons of EDR solutions. He describes the project as:</p><p class=""><em>The EDR Telemetry Project aims to provide a comprehensive comparison  of various Endpoint Detection and Response (EDR) solutions based on  their telemetry capabilities. By analyzing the data collected from  different EDR tools, the project helps organizations make informed  decisions when selecting an EDR solution that best fits their security  needs.</em></p><h2><em>Project Goals</em></h2><ul data-rte-list="default"><li><p class=""><em>Compare the telemetry data collected by different EDR solutions.</em></p></li><li><p class=""><em>Identify strengths and weaknesses of each EDR in terms of data visibility.</em></p></li><li><p class=""><em>Provide a resource for security professionals to evaluate EDR tools.</em></p></li></ul><p class="">You can find the project and Kostas here:</p><ul data-rte-list="default"><li><p class=""><a href="https://www.edr-telemetry.com/windows.html" target="_blank">https://www.edr-telemetry.com/windows.html</a></p></li><li><p class=""><a href="https://twitter.com/kostastsale" target="_blank">@Kostastsale</a></p></li><li><p class=""><a href="https://www.linkedin.com/in/kostastsale/" target="_blank">/in/kostastsale</a></p></li></ul><h2><strong>My thoughts:</strong></h2><p class="">Features for EDR are far more then the telemetry it collects.  In fact the telemetry is much lower down the list of what I look for when evaluating security products such as EDR.  If an EDR does not collect a type of telemetry I would like or expect, is there another solution that I have that can, or does to fill this gap?  Likely another solution will fill many gaps an EDR will have making telemetry important, but less of a deciding factor.  For example, without a good SIEM, EDR will miss, or not collect many important aspects or early indicators of an attack such as;</p><ul data-rte-list="default"><li><p class="">Early and ongoing Recon events</p></li><li><p class="">Lateral Movement</p></li></ul><p class="">JP-CERT has the BEST lateral movement detection research paper I have found and recommend it in my presentations.  It is this type of data that EDR does poorly on and a SIEM with the right data can do very well.</p><ul data-rte-list="default"><li><p class=""><a href="https://www.jpcert.or.jp/english/pub/sr/ir_research.html" target="_blank">https://www.jpcert.or.jp/english/pub/sr/ir_research.html</a></p></li></ul><p class="">Some things to consider when looking at an EDR solution that would be at the top of my list are things like;</p><ul data-rte-list="default"><li><p class="">Ease of use - Can a SOC use this solution</p></li><li><p class="">Can you get the details needed to remediate a system (Detailed Triage)</p></li><li><p class="">Can you easily exclude items and false positives (a lot will fail this one)</p></li><li><p class="">Can you easily create rules for new or missing telemetry (need logs)</p></li><li><p class="">Can you you add local logs to the solution (key)</p></li><li><p class="">Is the query language robust enough - Wildcards and include and exclude lists</p></li></ul><p class="">Not all EDRs should be compared, or should not be compared to others as their features are not close enough to compare.  There are two main categories of EDR type solutions;</p><ul data-rte-list="default"><li><p class="">Ecosystem - This would be the Cisco, Palo Alto, Checkpoint, etc. You likely buy their whole ecosystem and take advantage of the discounts and SIEMs they all own and have</p></li><li><p class="">Non-Ecosystem - These are solutions that are not associated with big iron or firewall vendors, independently owned or have multiple solutions</p></li></ul><p class="">You can get my slides and watch my talk on EDR from a few years ago here:</p><ul data-rte-list="default"><li><p class="">DerbyCon 2017 - <a href="http://www.irongeek.com/i.php?page=videos%2Fderbycon7%2Ft416-edr-etdr-next-gen-av-is-all-the-rage-so-why-am-i-enraged-michael-gough" target="_blank">http://www.irongeek.com/i.php?page=videos/derbycon7/t416-edr-etdr-next-gen-av-is-all-the-rage-so-why-am-i-enraged-michael-gough</a></p></li><li><p class="">DerbyCon 2017 Preso - <a href="https://www.slideshare.net/slideshow/edr-etdr-next-gen-av-is-all-the-rage-so-why-am-i-enraged/80220180" target="_blank">https://www.slideshare.net/slideshow/edr-etdr-next-gen-av-is-all-the-rage-so-why-am-i-enraged/80220180</a></p></li></ul><p class="">Another criteria that came out in our testing 16 EDR solutions is they type of attacks they can or cannot detect. We tested 3 types of attacks and compared the detection’s to the samples we used that our IPS solution detected. Shockingly… half did not detect samples the IPS saw a malicious comm indicator and that surprised us. The three conditions we tested were:</p><ul data-rte-list="default"><li><p class="">Typical user Word Doc type malware (most did fine with this)</p></li><li><p class="">Already infected system (some failed this)</p></li><li><p class="">Pushing malware to a system like an adversary/Red Team would do (many failed this)</p><p class="">An example that many EDRs we tested failed was Dll side loading where the folder and file get renamed on reboot (typical Dridex) and used a valid Windows utility (LoLBas) to load a malicious Dll in a user directory. More than half failed this test  </p></li></ul><p class="">Just some things to think about when deciding on an EDR type solution and be sure to compare solutions, apples to apples and be sure to seriously evaluate the solutions that they do what you expect.</p><p class="">Happy Hunting!</p>]]></description></item><item><title>More Cheat Sheets Added</title><dc:creator>HackerHurricane</dc:creator><pubDate>Mon, 26 Feb 2024 15:09:10 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2024/2/26/more-cheat-sheets-added</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:65dca915532d6638e4ba77cd</guid><description><![CDATA[<p class="">I have added a list and links of additional Cheat Sheets for various security and DFIR purposes for Windows, macOS and Linux as well as Cloud.</p><ul data-rte-list="default"><li><p class=""><a href="https://www.malwarearchaeology.com/cheat-sheets" target="_blank">More Cheat Sheets</a></p></li></ul>]]></description></item><item><title>Malware Discovery Course at BSides OK</title><dc:creator>HackerHurricane</dc:creator><pubDate>Tue, 13 Feb 2024 17:20:00 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2024/2/13/malware-discovery-course-at-bsides-ok</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:65cba43c02a20f73e877546b</guid><description><![CDATA[<p class="">Are you wanting to learn how to discover if malware is on a system?  Want to up your skills?  We are teaching a course at BSides OK April 3rd and 4th, 2024 - Glenpool Conference Center. The Con is Friday Apr 4th.  See you there!</p><p class="">For more information:</p><ul data-rte-list="default"><li><p class="">https://www.malwarearchaeology.com/md-training</p></li><li><p class="">https://bsidesok.com/</p></li></ul>]]></description></item><item><title>Crowdstrike Logscale Windows Logging Cheat Sheet Released - New for 2024 with Beats v7 agent info!</title><dc:creator>HackerHurricane</dc:creator><pubDate>Thu, 25 Jan 2024 19:20:23 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2024/1/25/crowdstrike-logscale-logging-cheat-sheet-updated</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:65b2b336b8083e7a2d626cae</guid><description><![CDATA[<p class="">New for 2024 is the addition of a Crowdstrike Logscale Windows Logging Cheat Sheet (formerly Humio). The cheat sheet has the latest queries and information to get started using Logscale for your logging needs. The queries use the latest Beats v7 field names. Lots of good info to get you started using the FREE solution from Crowdstrike to log your personal home systems, lab or test for using at your place of business. This is a powerful platform to log all-the-things and the new cheat sheet helps you log some of the right things!</p><ul data-rte-list="default"><li><p class=""><a href="https://www.malwarearchaeology.com/s/Windows-Logscale-Logging-Cheat-Sheet-v20.pdf" target="_blank"><strong>Crowdstrike Logscale Cheat Sheet</strong></a></p></li></ul><p data-rte-preserve-empty="true" class=""></p>]]></description></item><item><title>Beats yaml files updated for version 7 beats agents</title><dc:creator>HackerHurricane</dc:creator><pubDate>Mon, 03 Oct 2022 17:45:29 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2022/10/3/beats-yaml-files-updated-for-version-7-beats-agents</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:633b1eace5b3b97aeca14c5b</guid><description><![CDATA[<p class="">If you are using Beats version 7 and want sample WinLogBeats and FileBeats yaml files, there are now 2 new files for you to use.</p><ul data-rte-list="default"><li><p class="">FileBeat - Has examples of text file and CSV log file collections and exclusions including collection of the Beats logs</p></li><li><p class="">WinLogBeat - Has examples based on the logging cheat sheets and Sysmon to collect various log Event IDs and examples of tuning exclusions</p></li></ul><p class="">See the updates on the <a href="https://www.malwarearchaeology.com/logging">Logging Page</a></p><p data-rte-preserve-empty="true" class=""></p>]]></description></item><item><title>Upcoming Training for 2020</title><dc:creator>HackerHurricane</dc:creator><pubDate>Wed, 12 Feb 2020 16:30:11 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2020/2/12/upcoming-training-for-2020</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:5e44275add07666292502c25</guid><description><![CDATA[<p class="">BSides OK in Tulsa - April 8-9, - Malware Discovery 2 Days - POSTPONED - TBD</p><ul data-rte-list="default"><li><p class=""><a href="https://www.bsidesok.com" target="_blank">www.BSidesOK.com</a></p></li></ul><p class="">HouSecCon in Houston - May 5th - Preparing for a Ransomware or malware Incident 1 Day -  POSTPONED - TBD</p><ul data-rte-list="default"><li><p class=""><a href="https://www.houstonseccon.org" target="_blank">www.HoustonSecCon.org</a></p></li></ul>]]></description></item><item><title>Windows Registry Auditing Cheat Sheet updated for Aug 2019 v2.5</title><dc:creator>HackerHurricane</dc:creator><pubDate>Tue, 06 Aug 2019 13:03:41 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2019/8/6/windows-registry-logging-cheat-sheet-updated-for-aug-2019-v25</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:5d4979a9d16dbf0001dfe0f2</guid><description><![CDATA[<p class="">The Windows Registry Auditing Cheat Sheet has been updated to include a few new items to monitor for malicious activity.  Keep in mind when applying to the users space, that the current user (HKCU) is the one logged in.  Any other users you want to set Registry auditing on you must do so under HKU/GUID, so you must know their user GUID or use a script that crawls all the GUID and applies the settings.</p><p class="">You can get the new <a href="https://malwarearchaeology.com/cheat-sheets" target="_blank"><strong>Cheat Sheet HERE</strong></a>:</p><p data-rte-preserve-empty="true" class=""></p>]]></description></item><item><title>Training at BSides OK April 10th-11th 2018</title><dc:creator>HackerHurricane</dc:creator><pubDate>Mon, 10 Dec 2018 01:59:17 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2018/12/9/training-at-bsides-ok-april-10th-11th-2018</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:5c0dc511cd8366f04fd5bb05</guid><description><![CDATA[<h1>Malware Discovery and Basic Analysis</h1><h2>When:  April 10th-11th 2018</h2><h2>Where:  BSides OK (Just southwest of Tulsa) </h2><ul data-rte-list="default"><li><h2><a href="https://www.bsidesok.com/" target="_blank">BSidesok.com</a></h2></li></ul><ul data-rte-list="default"><li><h3><a href="http://www.glenpoolconferencecenter.com/167/Glenpool-Conference-Center" target="_blank">Glenpool Conference Center</a>&nbsp;in Glenpool, OK</h3></li><li><h2>Hotel - Holiday Inn Express &amp; Suites Glenpool Tulsa South (next door)</h2></li></ul><p>Course Description:</p><p>Malware Discovery and Malware Analysis is an essential skill for today’s Information Security, Security Operations Center (SOC), and IT professionals.  This course is perfect for people wanting to improve and get faster at Incident Response.    </p><p>This course focuses on performing fast triage and how to discover if a system has malware, how to build a malware analysis lab and perform basic malware analysis quickly.  The goal and objective to apply the results to Malware Management with actionable information to improve your Information Security program.  Tools and techniques used and steps to analyze malware to determine if a system is clean or truly infected will be covered.  The concept of Malware Management, Malware Discovery and Basic Malware Analysis will be discussed with exercises linking the three concepts together.</p><ul data-rte-list="default"><li><p><a href="https://www.malwarearchaeology.com/s/Malware-Discovery-and-Basic-Analysis-Training-2018.pdf" target="_blank">PDF of course description</a></p></li></ul>]]></description></item><item><title>Training in Houston April 9th, 2018</title><dc:creator>HackerHurricane</dc:creator><pubDate>Mon, 10 Dec 2018 01:44:11 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2018/12/9/training-in-houston-april-9th-2018</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:5c0dc3d5f950b74959d4e27e</guid><description><![CDATA[<h1>MITRE ATT&amp;CK, What is it, how to use and apply it to your organization</h1><h2>When:  April 9th, 2018 (1-Day)</h2><h2>Where:  HouSecCon Marriott Marquis Houston</h2><ul data-rte-list="default"><li><h2><a href="http://houstonseccon.org/" target="_blank">http://houstonseccon.org/</a></h2></li></ul><h2>Course Description:</h2><p>Mitre has created the “Adversarial Tactics, Techniques &amp; Common Knowledge” (ATT&amp;CK) to help security practitioners understand the actual techniques and tactics that adversaries use against us.  The advantage of ATT&amp;CK is it allows us to build a framework to understand how we might detect, respond, and prevent many of the tactics.  Creating your own ATT&amp;CK framework provides for a way for us to map what technologies, procedures, playbooks, reports/queries, and alerts we have, and then map any gaps that we have that then can be addressed.</p><ul data-rte-list="default"><li><p><a href="https://www.malwarearchaeology.com/s/Mitre-ATTCK-What-you-need-to-know-to-start-using-it-Training-2018.pdf" target="_blank">PDF of course description</a></p></li></ul><p data-rte-preserve-empty="true"></p>]]></description></item><item><title>Upcoming Training is San Antonio</title><dc:creator>HackerHurricane</dc:creator><pubDate>Thu, 13 Sep 2018 11:49:58 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2018/9/13/upcoming-training-is-san-antonio</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:5b9a4e8e0e2e72572884b09a</guid><description><![CDATA[<p>We are working with the Alamo ISSA Chapter to put on a 1-Day training.  Staay tuned for details and follow us on twitter.</p>]]></description></item><item><title>Windows Incident Response and Logging Training - Houston Weds Mar 22nd</title><dc:creator>HackerHurricane</dc:creator><pubDate>Wed, 11 Jan 2017 12:54:30 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2017/1/11/windows-incident-response-and-logging-training-houston-weds-mar-22nd</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:587629031b631b0b57d454d8</guid><description><![CDATA[<p>As a part of HouSeCon at the Derek hotel we are putting on a 1 Day '<em><strong>Windows Incident Response and Logging</strong></em>' course to help attendees get up to speed on basic IR concepts and to answer 5 questions about Windows logging and auditing;</p><ol><li>Why is Windows audit logging so important</li><li>How do you check a Windows system for proper audit logging?</li><li>Where do you get the information on what to set for proper audit logging</li><li>How do you set the proper things for proper audit logging</li><li>What tools can be used to view the audit logs</li></ol><p>You can sign up here for the training:</p><ul><li><a target="_blank" href="https://www.eventbrite.com/e/houseccon-70-training-classes-march-22-tickets-27291401316?mc_eid=89c2a8b8b4&amp;mc_cid=7922a1a0c2"><strong>HouSecCon Windows IR and Logging Training</strong></a></li></ul><p>And sign up for the conference on Thursday here:</p><ul><li><strong><a target="_blank" href="http://houstonseccon.com/">HouSecCon Security Conference</a></strong></li></ul>]]></description></item><item><title>Malware Discovery and Windows Incident Response &#x26; Logging Training - Austin Dec 12-14</title><dc:creator>HackerHurricane</dc:creator><pubDate>Wed, 31 Aug 2016 11:56:42 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2016/8/31/malware-discovery-and-windows-incident-response-logging-training-austin-dec-12-14</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:57c6c4a06a4963606771fdcb</guid><description><![CDATA[<p><strong>Malware Archaeology</strong> in conjunction with <strong>Capitol of Texas ISSA</strong>&nbsp;chapter is hosting a Malware Discovery and Basic Analysis 2 day class and Windows Incident Response and Logging 1 day class at the Wingate in Round Rock.</p><p>Looking to up your malwarez hunting skillz and learn some basics about Windows Incident Response and become a Windows logging guru, come to this class and learn how the blue teamers do it and catch the bad guys.</p><p>More info on the Austin ISSA website and register here:</p><ul dir="ltr"><li><a target="_blank" href="http://malwarearchaeologyaus.eventbrite.com/">Registration for the training</a></li></ul>]]></description></item><item><title>LOG-MD selected for Blackhat Arsenal based on the 'Windows Logging Cheat Sheet'</title><dc:creator>HackerHurricane</dc:creator><pubDate>Mon, 01 Aug 2016 18:39:49 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2016/8/1/log-md-selected-for-blackhat-arsenal-based-on-the-windows-logging-cheat-sheet</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:579f932a29687f489817b369</guid><description><![CDATA[<figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075873757-67PMJN6NEUHNA34RRO7P/image-asset.jpeg" data-image-dimensions="952x743" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075873757-67PMJN6NEUHNA34RRO7P/image-asset.jpeg?format=1000w" width="952" height="743" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075873757-67PMJN6NEUHNA34RRO7P/image-asset.jpeg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075873757-67PMJN6NEUHNA34RRO7P/image-asset.jpeg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075873757-67PMJN6NEUHNA34RRO7P/image-asset.jpeg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075873757-67PMJN6NEUHNA34RRO7P/image-asset.jpeg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075873757-67PMJN6NEUHNA34RRO7P/image-asset.jpeg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075873757-67PMJN6NEUHNA34RRO7P/image-asset.jpeg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075873757-67PMJN6NEUHNA34RRO7P/image-asset.jpeg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  






  <p>Come on by Blackhat Arsenal Thursday and check out <strong>LOG-MD</strong> in action with the latest version on how to check, set, and harvest malwarious activity on Windows systems.</p><h3 class="text-align-center"><strong>LOG-MD</strong><br />Michael Gough &amp; Brian Boettcher<br />Palm Foyer, Level 3, Station 8<br />16:00 - 17:50 </h3>

































































 

  
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075975353-74CP5R85OJE0XXW6X7JR/image-asset.png" data-image-dimensions="500x140" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075975353-74CP5R85OJE0XXW6X7JR/image-asset.png?format=1000w" width="500" height="140" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075975353-74CP5R85OJE0XXW6X7JR/image-asset.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075975353-74CP5R85OJE0XXW6X7JR/image-asset.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075975353-74CP5R85OJE0XXW6X7JR/image-asset.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075975353-74CP5R85OJE0XXW6X7JR/image-asset.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075975353-74CP5R85OJE0XXW6X7JR/image-asset.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075975353-74CP5R85OJE0XXW6X7JR/image-asset.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470075975353-74CP5R85OJE0XXW6X7JR/image-asset.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  






  <p>Based on the '<em><strong>Windows Logging Cheat Sheet</strong></em>' <strong>LOG-MD</strong> audits a Windows system for compliance to the 'Windows Logging Cheat Sheet', CIS, US-GCB and AU-ACSC standards, and if it fails creates a nice report to help you know what to set and then guides you where to set the items needed to pass the audit check. &nbsp;Once properly configured, <strong>LOG-MD</strong> then harvests security related log data to help you investigate a suspect system.</p><p>In addition <strong>LOG-MD</strong> can perform full file system hashing to create a baseline that can be used to compare against a suspect system. &nbsp;<strong>LOG-MD</strong> can also baseline the registry and compare a suspect system registry to a known good baseline to find altered settings and even look for LARGE Reg keys where malware is hiding payloads.</p><p>Come by Blackhat Arsenal and check us out and maybe get a goody too ;-)</p>

































































 

  
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          <a class="
                sqs-block-image-link
                
          
        
              " href="https://www.blackhat.com/us-16/arsenal.html#log-md" target="_blank"
          >
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470076350797-60JZYBR9H5AXXKZ45SUH/image-asset.jpeg" data-image-dimensions="147x23" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470076350797-60JZYBR9H5AXXKZ45SUH/image-asset.jpeg?format=1000w" width="147" height="23" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470076350797-60JZYBR9H5AXXKZ45SUH/image-asset.jpeg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470076350797-60JZYBR9H5AXXKZ45SUH/image-asset.jpeg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470076350797-60JZYBR9H5AXXKZ45SUH/image-asset.jpeg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470076350797-60JZYBR9H5AXXKZ45SUH/image-asset.jpeg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470076350797-60JZYBR9H5AXXKZ45SUH/image-asset.jpeg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470076350797-60JZYBR9H5AXXKZ45SUH/image-asset.jpeg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1470076350797-60JZYBR9H5AXXKZ45SUH/image-asset.jpeg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          </a>
        

        
      
        </figure>]]></description></item><item><title>Malware Discovery Training coming to Austin, TX.  Oct/Nov</title><dc:creator>HackerHurricane</dc:creator><pubDate>Thu, 28 Jul 2016 16:26:55 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2016/7/28/malware-discovery-training-coming-to-austin-tx-octnov</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:579a318fff7c505e3920715b</guid><description><![CDATA[<p>Austin - Oct/Nov 2016 - Sponsored by the ISSA Capitol of Texas chapter<br />Wingate Round Rock Conference Center</p><p>Oct 3rd thru 5th, 2016 (Tentative date, it may have to move to a later date)</p><ul dir="ltr"><li><h3><a target="_blank" href="http://AustinISSA.org">AustinISSA.org</a></h3></li></ul><p>More information and registration here:</p><ul dir="ltr"><li><a target="_blank" href="http://malwarearchaeologyaus.eventbrite.com">http://malwarearchaeologyaus.eventbrite.com</a></li></ul>]]></description></item><item><title>Malware Discovery Training coming to Oklahoma City July 18-20</title><dc:creator>HackerHurricane</dc:creator><pubDate>Thu, 09 Jun 2016 11:24:33 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2016/6/9/malware-discovery-training-coming-to-oklahoma-city-july-18-20</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:575951d82fe131dea625f635</guid><description><![CDATA[<p><strong>Oklahoma City - Malware Discovery and Basic Malware Analysis</strong></p><p>George Epperly Business Building - Rose State College - 6420 Southeast 15th Street, Midwest City, OK 73110</p><ul><li><strong>July 18th-19th 2016 - Sponsored by the ISSA OKC chapter</strong></li></ul><p><strong>Oklahoma City - Windows Incident Response and Logging</strong></p><ul><li><strong>July 20th 2016 - Sponsored by the ISSA OKC chapter</strong></li><li><h3><strong><a target="_blank" href="http://www.issaokc.org/">ISSA-OKC website</a></strong></h3></li></ul><h3><strong>More information and register here:</strong></h3><ul><li><p><strong><a target="_blank" href="http://malwarearchaeologyokc.eventbrite.com/">http://malwarearchaeologyokc.eventbrite.com</a></strong></p></li></ul>]]></description></item><item><title>Links to some of our presentations now posted</title><dc:creator>HackerHurricane</dc:creator><pubDate>Thu, 02 Jun 2016 03:34:47 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2016/6/1/links-to-some-of-our-presentations-now-posted</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:574fa900d51cd4162ff1a898</guid><description><![CDATA[<h3>You can now get the links to some of our recent presentations here:</h3><ul><li><h3><a target="_blank" href="http://www.malwarearchaeology.com/presentations/"><strong>MalwareArchaeology.com/presentations</strong></a></h3></li></ul>]]></description></item><item><title>Great shout out from Paul and John on the Security Weekly Enterprise Podcast Episode 5 </title><dc:creator>HackerHurricane</dc:creator><pubDate>Thu, 02 Jun 2016 01:36:56 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2016/6/1/great-shout-out-from-paul-and-john-on-the-security-weekly-enterprise-podcast-episode-5</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:574f8ba6e32140a5954e1886</guid><description><![CDATA[<p>Paul Asadoorian and John Strand discussing Log Management and SIEM mention the Cheat Sheets to help you know what to set and look for in your Windows logs. &nbsp;Thanks gents, I guess it is time to come on the PodCast and let you know what we are up to.</p><ul dir="ltr"><li><strong><a target="_blank" href="http://www.youtube.com/watch?v=aWCbJnT0-8c&amp;sns=em">Security Weekly Enterprise PodCast Episode 5</a></strong></li></ul><p>It is important to point out that you cannot start to gain the benefit of your Log Management solution or SIEM until you enable and configure your Windows log setting per the Cheat Sheets found here:</p><ul dir="ltr"><li><strong><a href="https://www.malwarearchaeology.com/cheat-sheets">Windows Logging Cheat Sheets</a></strong></li></ul><p>#Happy Hunting</p>]]></description></item><item><title>Windows Top 10 Events to monitor from My Dell Enterprise Security Summit Talk</title><dc:creator>HackerHurricane</dc:creator><pubDate>Sun, 08 May 2016 02:38:51 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2016/5/7/windows-top-10-event-logs-from-my-dell-enterprise-security-summit-talk</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:572ea39d2b8dde9e10b25c31</guid><description><![CDATA[<figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462675097440-T9RI7XFNO6OPVM4WHQJP/image-asset.jpeg" data-image-dimensions="632x469" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462675097440-T9RI7XFNO6OPVM4WHQJP/image-asset.jpeg?format=1000w" width="632" height="469" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462675097440-T9RI7XFNO6OPVM4WHQJP/image-asset.jpeg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462675097440-T9RI7XFNO6OPVM4WHQJP/image-asset.jpeg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462675097440-T9RI7XFNO6OPVM4WHQJP/image-asset.jpeg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462675097440-T9RI7XFNO6OPVM4WHQJP/image-asset.jpeg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462675097440-T9RI7XFNO6OPVM4WHQJP/image-asset.jpeg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462675097440-T9RI7XFNO6OPVM4WHQJP/image-asset.jpeg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462675097440-T9RI7XFNO6OPVM4WHQJP/image-asset.jpeg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  






  <p>Here is the presentation from the talk I gave at the Dell Enterprise Security Summit in Atlanta April 21, 2016.</p><p><a target="_blank" href="http://www.slideshare.net/Hackerhurricane/the-top-10-windows-logs-event-ids-used-v10?qid=e0003812-fbf1-4733-a5c7-379b39b4deba&amp;v=&amp;b=&amp;from_search=7">SlideShare Presentation - WIndows Top 10 Events to monitor</a></p>]]></description></item><item><title>Malware Discovery and Basic Malware Analysis Training - May 19th-20th in Houston, TX.</title><dc:creator>HackerHurricane</dc:creator><pubDate>Tue, 03 May 2016 22:53:17 +0000</pubDate><link>https://www.malwarearchaeology.com/home/2016/5/3/malware-discovery-and-basic-malware-analysis-training-may-19th-20th-in-houston-tx</link><guid isPermaLink="false">552092d5e4b0661088167e5c:5520a51fe4b0562b85237540:57292b5045bf215317770c97</guid><description><![CDATA[<figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462315971925-VWA9TOBFRE85MTSUEGMT/image-asset.jpeg" data-image-dimensions="1798x910" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462315971925-VWA9TOBFRE85MTSUEGMT/image-asset.jpeg?format=1000w" width="1798" height="910" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462315971925-VWA9TOBFRE85MTSUEGMT/image-asset.jpeg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462315971925-VWA9TOBFRE85MTSUEGMT/image-asset.jpeg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462315971925-VWA9TOBFRE85MTSUEGMT/image-asset.jpeg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462315971925-VWA9TOBFRE85MTSUEGMT/image-asset.jpeg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462315971925-VWA9TOBFRE85MTSUEGMT/image-asset.jpeg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462315971925-VWA9TOBFRE85MTSUEGMT/image-asset.jpeg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1462315971925-VWA9TOBFRE85MTSUEGMT/image-asset.jpeg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  


  





  <p>We are hosting another <em><strong>Malware Discovery and Basic Analysis</strong></em> class in Houston at Rice University.</p><p><strong>When:&nbsp;May 19th-20th 2016</strong></p><p><strong>Sponsored by: the ISSA South Texas chapter.</strong></p><ul><li><a target="_blank" href="http://southtexasissa.org">southtexasissa.org</a></li></ul><h3><strong>Register here:</strong></h3><ul><li><p><a target="_blank" href="https://www.eventbrite.com/e/malware-discovery-and-basic-analysis-tickets-24495505717">https://www.eventbrite.com/e/malware-discovery-and-basic-analysis-tickets-24495505717</a></p></li></ul>]]></description></item></channel></rss>