Home Security #ioc

Tagged #ioc

10 posts

Microsoft 365 AiTM Defense

Sentinel detection, sign-in from a hosting ASN

Real users sign in from residential ISPs and corporate networks. Attackers replaying cookies sign in from rented VPS. …

Detection 6 min
Microsoft 365 AiTM Defense

AiTM incident response, what to do when the alert fires at 2am

Step-by-step runbook for when an AiTM detection lights up. Revoke, reset, audit, clean persistence, pivot-hunt. Exact PowerShell included.

Playbook 8 min
LinkedIn AiTM Defense

Detecting LinkedIn AiTM, three queries and a Python monitor

SPL queries for credentials submitted to a non-LinkedIn domain, li_at replayed from a new ASN, and impossible travel …

Detection 10 min
LinkedIn AiTM Defense

LinkedIn AiTM incident response runbook

Triage, contain, scope, notify, preserve evidence. The full sequence with exact LinkedIn URLs and timing expectations from real …

Playbook 9 min
Microsoft 365 OAuth Consent Defense

Five Sentinel detections for OAuth consent attacks (with the KQL inline)

Suspicious consent grant, mass campaign, anomalous SP sign-in, post-consent credential addition, and Graph API mass read. Plus a …

Detection 11 min
Microsoft 365 OAuth Consent Defense

Containing an OAuth consent compromise, the four moves you have to make in order

Revoke grants. Disable the SP. Revoke refresh tokens. Tenant-block the AppId. Order matters and most SOCs do it …

Playbook 12 min
Gmail BitM Defense

Detecting BitM against Gmail, network signals, browser signals, and the Workspace audit query

RFB protocol handshake on a WebSocket. Canvas-rendered login pages with no password input in the DOM. Input lag …

Detection 11 min
Gmail BitM Defense

Responding to a Gmail BitM compromise, the OAuth-revoke step every other playbook skips

Password rotation does not revoke the OAuth refresh token. Sign-out-all-sessions does not revoke the OAuth refresh token. Until …

Playbook 11 min
Microsoft 365 Device Code Defense

Detecting device code phishing in Microsoft Sentinel, one field, one rule

Every successful device code sign-in writes `AuthenticationProtocol == deviceCode` to SigninLogs. Normal users almost never trigger this. The …

Detection 6 min
Microsoft 365 Device Code Defense

Device code phishing incident response, what to do when you find a sign-in you cannot explain

A device code sign-in in SigninLogs that nobody authorized. The attacker has had a 90-day refresh token since …

Playbook 6 min