tomchop
banner
tomchop.me
tomchop
@tomchop.me
810 followers 370 following 130 posts
Cybersecurity nerd; #DFIR @ Google by day; FOSS, threat intel and malware analysis by night. Investigator, coder, terrible sense of humor. https://yeti-platform.io and more (github.com/tomchop) views are my own • he/him • tomchop.me
Posts Media Videos Starter Packs
Reposted by tomchop
Using Timesketch for timeline analysis? We recently added a new feature: LLM summaries of up to 500 events in view. Example below uses Gemini Flash, but you can just as easily use a local Ollama model. Setup guide: timesketch.org/guides/user/...
Reposted by tomchop
Great stuff from @tomchop.me! Memory analysis and Yara support in #OpenRelik

#DFIR
I had a look at #OpenRelik last year and wrote a couple workers that might be useful:

* github.com/tomchop/open...: Scan memory images using @volatilityfoundation.org plugins. Supports Yara rules
* github.com/tomchop/open... - Run Yara rules on a directory. Supports third-party systems like #Yeti!
tomchop @tomchop.me · Jan 7
I had a look at #OpenRelik last year and wrote a couple workers that might be useful:

* github.com/tomchop/open...: Scan memory images using @volatilityfoundation.org plugins. Supports Yara rules
* github.com/tomchop/open... - Run Yara rules on a directory. Supports third-party systems like #Yeti!
Reposted by tomchop
New #OpenRelik release. Task metrics (queue length, completion, failures etc) & new Prometheus exporter. Plus, a new task dashboard for deep dives into task performance.

📝 openrelik.org/changelog/
🔗 discord.gg/hg652gktwX

#DFIR
tomchop @tomchop.me · Dec 12
This is also the reason I never talk publicly about my dog, any favorite foods, or the season we were in < 3 months ago
When i see trends that ask me to post about movies that came out the year i was born or photos from the city i was born in or anything asking for information that could be used to crack a password I remember the golden rule:

Don't share any information Ron Swanson wouldn't share
a man with a mustache is holding a cup and saying i like saying " no " .
Alt: a man with a mustache is holding a cup and saying i like saying " no " .
media.tenor.com
tomchop @tomchop.me · Dec 4
I made this one, which tracks a bunch of infosec-related keywords (and blocks noisy accounts): bsky.app/profile/did:...
tomchop @tomchop.me · Nov 29
Looks like the kind of manual you could find in The Last of Us that would allow you to upgrade your rifle
tomchop @tomchop.me · Nov 27
Travel budgets are tight yo
tomchop @tomchop.me · Nov 27
Looks like shit just got real @swiftonsecurity.com
Reposted by tomchop
if you have a @github.com profile, can i ask you to update it with your @bsky.app handle? 🙏

👉 it enables some very cool integrations, like auto curated feeds and starter packs for contributors and tech
tomchop @tomchop.me · Nov 23
“i know bsky is an echo chamber because those echo chamber posts keep coming back around and i know what an echo is”
tomchop @tomchop.me · Nov 21
There's probably less content than there was on twitter in 2012, but this already feels much nicer and relevant than what X is right now.
tomchop @tomchop.me · Nov 19
Shiiiiyet, I'm gonna try to not miss this edition! 🤞🏼🤞🏼🤞🏼
tomchop @tomchop.me · Nov 19
Amazing, thanks! skyfeed.app offers a (less polished, more hacky) similar interface but also allows you to create custom feeds
tomchop @tomchop.me · Nov 18
*cue pokémon battle song*

"plaso I choose you!!"
Starter Pack containing #infosec trainers — if I missed any, lmk!

go.bsky.app/V5iocw6
tomchop @tomchop.me · Nov 17
Thanks, this is useful! I also started a feed a long time ago with more generic infosec keywords: bsky.app/profile/did:...
bsky.app
tomchop @tomchop.me · Nov 15
Thinking of coming up with a Bluesky #DFIR Starter Pack with @the4711.org... who should we include?
Reposted by tomchop
I'm watching some folks reverse engineer the xz backdoor, sharing some *preliminary* analysis with permission.

The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().

It's RCE, not auth bypass, and gated/unreplayable.
This might be the best executed supply chain attack we've seen described in the open, and it's a nightmare scenario: malicious, competent, authorized upstream in a widely used library.

Looks like this got caught by chance. Wonder how long it would have taken otherwise.
Woah. Backdoor in liblzma targeting ssh servers.

www.openwall.com/lists/oss-se...

It has everything: malicious upstream, masterful obfuscation, detection due to performance degradation, inclusion in OpenSSH via distro patches for systemd support…

Now I’m curious what it does in RSA_public_decrypt
Reposted by tomchop
Today, we published this Field Guide to incident response for civil society and media, which I’ve been working on for the past year or so and which I am pretty excited about internews.org/resource/fie...
tomchop @tomchop.me · Nov 14
Yes, for sure. Otherwise does the project even exist?? I tried briefly playing a bit with Dall-E but didn't get any satisfying results :(