<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[I Red Team DEV - Blue Team - General ]]></title>
		<link>https://ired.dev/</link>
		<description><![CDATA[I Red Team DEV - https://ired.dev]]></description>
		<pubDate>Tue, 05 May 2026 12:15:38 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[A series of scripts to harden Macos 15 Sequoia]]></title>
			<link>https://ired.dev/showthread.php?tid=47</link>
			<pubDate>Wed, 23 Jul 2025 21:55:35 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=47</guid>
			<description><![CDATA[A series of scripts to harden macOS 15.5 (Sequoia) for security and<br />
privacy, inspired by NIST guidelines. Suitable for power users and<br />
novices alike. This project evolved from the macOS Security Compliance<br />
Project, a Python-based tool, with the current focus on Bash scripts<br />
while preserving legacy features.<br />
<a href="https://github.com/cluster2600/ALBATOR" target="_blank" rel="noopener" class="mycode_url">https://github.com/cluster2600/ALBATOR</a>]]></description>
			<content:encoded><![CDATA[A series of scripts to harden macOS 15.5 (Sequoia) for security and<br />
privacy, inspired by NIST guidelines. Suitable for power users and<br />
novices alike. This project evolved from the macOS Security Compliance<br />
Project, a Python-based tool, with the current focus on Bash scripts<br />
while preserving legacy features.<br />
<a href="https://github.com/cluster2600/ALBATOR" target="_blank" rel="noopener" class="mycode_url">https://github.com/cluster2600/ALBATOR</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[?️‍♂️ Story: “The Last Memory of Hard Drive 12”]]></title>
			<link>https://ired.dev/showthread.php?tid=15</link>
			<pubDate>Sun, 15 Jun 2025 08:41:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=15</guid>
			<description><![CDATA[(A Journey into Digital Forensics Through Deception, Destruction, and Discovery)<br />
⸻<br />
? Chapter 1: The Midnight Call<br />
11:47 PM – I received a call from an old client, this time not for a routine review or training, but for a serious incident.<br />
“We lost all the R&amp;D data for our new product line. It seems someone intentionally erased the hard drive and the backup. The director is furious. Can you come right away?”<br />
I nodded, grabbed my specialized bag: the forensic hard drive, the Autopsy copyright dongle, write blocker, flashlight, and a packet of instant coffee.<br />
⸻<br />
? Chapter 2: Cold Air-Conditioned Room, Hot Hard Drives<br />
When I arrived, the room was dark and cold, and the server drive smelled faintly of ozone.<br />
The suspect hard drive – number 12 – was placed separately in an anti-static box.<br />
“I found it wiped yesterday around 3am. But no one was on duty. The camera logs are missing.”<br />
I used a write blocker to connect the drive to the forensic machine.<br />
The data had been “zeroed out” – meaning the entire sector had been overwritten with byte 00.<br />
But luckily: not the entire drive, just a major portion. I decided to use photorec and then bulk_extractor to start scanning each sector.<br />
⸻<br />
? Chapter 3: Blood in the Log<br />
After almost 2 hours of extracting data from the remaining part, I recovered some hidden logs: SRUM (System Resource Usage Monitor) - few people know that it saves the machine's activities for a long time.<br />
Including:<br />
• Specific command line launch time: cipher /w:C:\<br />
• Executor: account "qa-dev1"<br />
• From there, I traced the entire command line chain: a USB plugged in 2 minutes ago, the D drive mounted.<br />
I started to see the scenario more clearly:<br />
• A person with elevated privileges<br />
• Accessing the R&amp;D system<br />
Using the encryption script to quickly overwrite the data and then removing the USB<br />
⸻<br />
? Chapter 4: Ghost in VPN<br />
Watching from account qa-dev1, I analyzed the VPN logs. There was a connection from an IP address in Central Europe, which did not match this employee's address.<br />
I asked to check qa-dev1's workstation. The employee was... on a 3-day vacation to Da Lat.<br />
Analyzing his memory dump, I found:<br />
• Remote access tool (AnyDesk) running in the background<br />
• Small executable file called update_vpn_svc.exe - a lightweight RAT backdoor<br />
And more: the keepalive.log file records a strange IP address - similar to the VPN IP address mentioned above<br />
It seems that someone used the QA account, combined with a long-installed Trojan - to attack the company itself.<br />
⸻<br />
? Chapter 5: The Man in the Shadows<br />
I analyzed the timeline in more depth. In the last 6 weeks, the update_vpn_svc.exe software was installed after QA borrowed a USB from an external partner to "copy the test library".<br />
The USB - the silent killer - is back once again.<br />
⸻<br />
? Chapter 6: The Last Wall<br />
I had to run Plaso to reconstruct the detailed timeline: every login, USB insertion, script execution. After almost 12 hours, I built the big picture:<br />
1. Backdoor secretly installed 6 weeks ago via USB.<br />
2. Attacker was patiently observed via AnyDesk.<br />
3. Waited until QA was on vacation - attacked via VPN.<br />
4. Accessed R&amp;D server, downloaded data via SMB.<br />
5. Finally: used encryption to destroy the drive and hide the traces.<br />
⸻<br />
⚖️ Final Chapter: Justice and Reform<br />
The company reported to the investigation agency. We extracted all the IOCs, wrote a 50+ page report of findings, including:<br />
• Forensic images of hard drive 12<br />
• IOCs: IP, file hash, backdoor, script deletion<br />
• Detailed timeline<br />
• Key vulnerabilities: no USB monitoring, no 2FA for VPN enabled, no regular remote tool checks<br />
⸻<br />
✅ Message from hard drive 12<br />
“The bad guys don’t have to be good. They just have to be patient.<br />
And if you don’t look at the usage logs, they’ll disappear like water – until it’s too late.”]]></description>
			<content:encoded><![CDATA[(A Journey into Digital Forensics Through Deception, Destruction, and Discovery)<br />
⸻<br />
? Chapter 1: The Midnight Call<br />
11:47 PM – I received a call from an old client, this time not for a routine review or training, but for a serious incident.<br />
“We lost all the R&amp;D data for our new product line. It seems someone intentionally erased the hard drive and the backup. The director is furious. Can you come right away?”<br />
I nodded, grabbed my specialized bag: the forensic hard drive, the Autopsy copyright dongle, write blocker, flashlight, and a packet of instant coffee.<br />
⸻<br />
? Chapter 2: Cold Air-Conditioned Room, Hot Hard Drives<br />
When I arrived, the room was dark and cold, and the server drive smelled faintly of ozone.<br />
The suspect hard drive – number 12 – was placed separately in an anti-static box.<br />
“I found it wiped yesterday around 3am. But no one was on duty. The camera logs are missing.”<br />
I used a write blocker to connect the drive to the forensic machine.<br />
The data had been “zeroed out” – meaning the entire sector had been overwritten with byte 00.<br />
But luckily: not the entire drive, just a major portion. I decided to use photorec and then bulk_extractor to start scanning each sector.<br />
⸻<br />
? Chapter 3: Blood in the Log<br />
After almost 2 hours of extracting data from the remaining part, I recovered some hidden logs: SRUM (System Resource Usage Monitor) - few people know that it saves the machine's activities for a long time.<br />
Including:<br />
• Specific command line launch time: cipher /w:C:\<br />
• Executor: account "qa-dev1"<br />
• From there, I traced the entire command line chain: a USB plugged in 2 minutes ago, the D drive mounted.<br />
I started to see the scenario more clearly:<br />
• A person with elevated privileges<br />
• Accessing the R&amp;D system<br />
Using the encryption script to quickly overwrite the data and then removing the USB<br />
⸻<br />
? Chapter 4: Ghost in VPN<br />
Watching from account qa-dev1, I analyzed the VPN logs. There was a connection from an IP address in Central Europe, which did not match this employee's address.<br />
I asked to check qa-dev1's workstation. The employee was... on a 3-day vacation to Da Lat.<br />
Analyzing his memory dump, I found:<br />
• Remote access tool (AnyDesk) running in the background<br />
• Small executable file called update_vpn_svc.exe - a lightweight RAT backdoor<br />
And more: the keepalive.log file records a strange IP address - similar to the VPN IP address mentioned above<br />
It seems that someone used the QA account, combined with a long-installed Trojan - to attack the company itself.<br />
⸻<br />
? Chapter 5: The Man in the Shadows<br />
I analyzed the timeline in more depth. In the last 6 weeks, the update_vpn_svc.exe software was installed after QA borrowed a USB from an external partner to "copy the test library".<br />
The USB - the silent killer - is back once again.<br />
⸻<br />
? Chapter 6: The Last Wall<br />
I had to run Plaso to reconstruct the detailed timeline: every login, USB insertion, script execution. After almost 12 hours, I built the big picture:<br />
1. Backdoor secretly installed 6 weeks ago via USB.<br />
2. Attacker was patiently observed via AnyDesk.<br />
3. Waited until QA was on vacation - attacked via VPN.<br />
4. Accessed R&amp;D server, downloaded data via SMB.<br />
5. Finally: used encryption to destroy the drive and hide the traces.<br />
⸻<br />
⚖️ Final Chapter: Justice and Reform<br />
The company reported to the investigation agency. We extracted all the IOCs, wrote a 50+ page report of findings, including:<br />
• Forensic images of hard drive 12<br />
• IOCs: IP, file hash, backdoor, script deletion<br />
• Detailed timeline<br />
• Key vulnerabilities: no USB monitoring, no 2FA for VPN enabled, no regular remote tool checks<br />
⸻<br />
✅ Message from hard drive 12<br />
“The bad guys don’t have to be good. They just have to be patient.<br />
And if you don’t look at the usage logs, they’ll disappear like water – until it’s too late.”]]></content:encoded>
		</item>
	</channel>
</rss>