Skip to main content
Mike (Rem)

Mike (Rem)

Blue Teamer, Malware Analyst, OSS Security Enthusiast

Recent

Chainsaw Hunt & Rules
·3715 words·18 mins
Chainsaw’s hunt feature, along with Chainsaw’s rule engine, is an excellent way to hunt for evil at scale and create reusable, maintainable queries for rapid triage. We will apply this to both simulated red team engagements and real world compromises to detect lateral movement, Impacket, and even ASP.NET compromises.
Chainsaw Search
·2225 words·11 mins
A brief introduction to Chainsaw’s search feature and the document tagging engine, Tau, that WithSecure released in the most recent major Chainsaw update. We will discuss and demystify some of the nuance of Tau’s query behavior, and apply these to hands on examples of simple queries that can be utilized to detect evil across numerous event logs with high fidelity.
Obfuscation: An Open-Source Nightmare
·1809 words·9 mins
Discussing obfuscation and its effect on the broader open-source supply chain.
The Big List of Malware Analysis Tools
·2003 words·10 mins
A continually evolving knowledgebase of things I’ve found pertinent as a threat and security operations analyst, specifically focusing on malware analysis.
The XZ Backdoor Dilemma
·2674 words·13 mins
No-lone zones are ubiquitous with critical military tasks, and the scope and potential impact of the xz backdoor present an excellent opportunity to discuss how this could be applied to open source software.