Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

[Discussion] Continuation of FRSTClasses?


  • Please log in to reply
9 replies to this topic

#1 SwimminThruGrey

SwimminThruGrey

  •  Avatar image
  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:08:43 AM

Posted 12 November 2024 - 01:20 AM

Hey All!

 

So originally, I had joined here to hopefully get into the training for FRST - namely I'm interested in learning more about:

  • Infection Identification
  • Infection Eradication/Recovery
  • Applied usage of FRST during the other 2 points (I am aware of the post that explains general use - but looking for more directed examples against prevalent threats)

Unfortunately, I heard through the grapevine that the classes/training for FRST were closed

 

I'm wondering:

  • What were the reasons/rationale that the classes were ended - maybe we could crowdsource the work a bit?
  • Can we open up the educational material that was used in these trainings to the forum users to help strengthen and give back to the security community?

Part of being a member of the security community means educating and spreading knowledge with each other to improve the worlds general security posture and to keep Sisyphus' boulder rollin'. I know it can be a time constraint to offer classes specifically, but I can't foresee any rationale as to why we couldn't share texts used, resources, etc. If this is a hard "no because I say so" that's fine too. I would love to spread what information I can find and take that endeavor on.

 

Hoping to find some greater clarity and keep the interest in the field alive and well despite the challenges that come along with changing times (using Discord as c2 channels... you gotta give 'em credit for creativity at the very least)



BC AdBot (Login to Remove)

 


#2 cryptodan

cryptodan

    Bleepin Madman


  •  Avatar image
  • Members
  • 36,797 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:08:43 AM

Posted 12 November 2024 - 09:19 AM

Have a read here https://www.bleepingcomputer.com/forums/t/780727/bleeping-computers-malware-removal-training-program-discontinued/
US Navy Veteran from 2002 to 2006
Masters in Computer and Digital Forensics Expert - Stevenson University Alumni 2015
Arch Desktop - https://termbin.com/1h62
Arch Laptop - hhttps://www.termbin.com/98dd
Ubuntu Server - https://termbin.com/ng9t

#3 SwimminThruGrey

SwimminThruGrey
  • Topic Starter

  •  Avatar image
  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:08:43 AM

Posted 12 November 2024 - 12:37 PM

Yep thats the post I was referring to - Nothing is really explained in there to be perfectly honest. Saying today's malware can't be removed is a pretty heavy over-generalization to be perfectly frank. Yes, some things like ransomware aren't ideal candidates but there are plenty of things still around that can be like browser hijackers, malicious extensions, general adware, and so on.

 

In all transparency - I noticed that user Elise was inactive for nearly a year prior to responding to that thread, so I'm wondering if there just wasn't enough time available to host these classes, or if there wasn't enough interest from the community?

 

 

I have a feeling there is other reasoning/rationale behind the move and am curious about that aspect. Further, still looking to see if the other points in my post can be addressed regarding releasing the educational material and/or training material as to how FRST was being used to address malware. If not, like I said, that's totally fine - I plan on taking that on and sharing resources in posts here for others reading.


Edited by SwimminThruGrey, 12 November 2024 - 12:54 PM.


#4 cryptodan

cryptodan

    Bleepin Madman


  •  Avatar image
  • Members
  • 36,797 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:08:43 AM

Posted 12 November 2024 - 12:46 PM

Those hijacks are sometimes included in ransomware infections
US Navy Veteran from 2002 to 2006
Masters in Computer and Digital Forensics Expert - Stevenson University Alumni 2015
Arch Desktop - https://termbin.com/1h62
Arch Laptop - hhttps://www.termbin.com/98dd
Ubuntu Server - https://termbin.com/ng9t

#5 SwimminThruGrey

SwimminThruGrey
  • Topic Starter

  •  Avatar image
  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:08:43 AM

Posted 12 November 2024 - 12:56 PM

Those hijacks are sometimes included in ransomware infections

Which is fine, but to say that we can't provide any training because some infections are hard seems quite odd/not the full story to me, in my own opinion.


Edited by SwimminThruGrey, 12 November 2024 - 12:57 PM.


#6 cryptodan

cryptodan

    Bleepin Madman


  •  Avatar image
  • Members
  • 36,797 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:08:43 AM

Posted 12 November 2024 - 01:30 PM

Well, that's the facts in the matter and remember this was a volunteer program offered for FREE.

If you want to learn malware removal, then I would highly recommend looking at SANS Institute for proper training.
US Navy Veteran from 2002 to 2006
Masters in Computer and Digital Forensics Expert - Stevenson University Alumni 2015
Arch Desktop - https://termbin.com/1h62
Arch Laptop - hhttps://www.termbin.com/98dd
Ubuntu Server - https://termbin.com/ng9t

#7 SwimminThruGrey

SwimminThruGrey
  • Topic Starter

  •  Avatar image
  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:08:43 AM

Posted 12 November 2024 - 01:51 PM

Well, that's the facts in the matter and remember this was a volunteer program offered for FREE.

If you want to learn malware removal, then I would highly recommend looking at SANS Institute for proper training.

Totally understand, like I said - sh!t happens, if someone didn't have the time to support a class that's totally understandable. The economy in the states here isn't great and most are pretty busy as of late - I would be happy to fill in that gap as much as possible in my own way - not looking to "replace" in any way. OSINT is life.

 

Last, SANS is incredibly expensive. I'll hit on this point once more - I don't see what the harm would be in sharing the educational materials that were used in the training courses (which were free), unless there were concerns about efficacy in said materials. If that is the case, that's fine too of course. Just looking for transparency/clarity here so I can better plan my approach.

 

Security behooves everyone, I don't see a point in gating "how to find out if someone broke into your house and is spying on you or planning to harm you" behind a paywall. That feels perverse at best, people have a right to know if their digital life is in jeopardy.



#8 cryptodan

cryptodan

    Bleepin Madman


  •  Avatar image
  • Members
  • 36,797 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:08:43 AM

Posted 12 November 2024 - 02:02 PM

Can I ask you what you know about cyber security as it pertains to Red and Purple Teaming?
US Navy Veteran from 2002 to 2006
Masters in Computer and Digital Forensics Expert - Stevenson University Alumni 2015
Arch Desktop - https://termbin.com/1h62
Arch Laptop - hhttps://www.termbin.com/98dd
Ubuntu Server - https://termbin.com/ng9t

#9 SwimminThruGrey

SwimminThruGrey
  • Topic Starter

  •  Avatar image
  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:08:43 AM

Posted 12 November 2024 - 02:17 PM

Can I ask you what you know about cyber security as it pertains to Red and Purple Teaming?

Yeah! I mostly am a professional Blue Teamer, but in my free time I like bug bounty hunting (ethically, of course - do no harm), CTF challenges and the like. The synergy between knowing both sides helps in whatever the efforts are for a given team.

 

So for example, when working within a Blue Team context, knowing how Red Teams do it helps to bolster the blue team. When working from a Red Team perspective in CTFs or hunting for bugs, knowing how the Blue Team is doing things helps me to dodge those and find serious problems.

 

It helps with burnout too to be bouncin' around a bit. That's the nice part about Cyber/Info Sec - lots of room/flexibility in what you do. Accountants hang up their hats at the end of the day, cyber sec is life!  :cowboy:

 

Edit: I forgot to mention! I want to get into malware research and reversing as well. I find it fascinating to see what sneaky tricks threat actors are using from an academic standpoint. Life can be so monotonous sometimes, its cool to experience new thoughts, techniques, etc. ^_^


Edited by SwimminThruGrey, 12 November 2024 - 02:19 PM.


#10 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:43 AM

Posted Yesterday, 08:54 PM

Are you aware of this?: FRST Tutorial - How to use Farbar Recovery Scan Tool

Reading and studying everything you can are the first steps in learning.

Malware Analysis & Forensics:

Advanced Malware Analysis & Forensics Resources:

Malware Analysis Tools:

Up close and personal with Linux malware

Compared to Windows malware, Linux malware tends to be less obfuscated and easier to analyze. Obfuscation is often added to evade detection by security products. Since there are often no security products to bypass, the bar is lower and attackers skip this unnecessary step.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif





2 user(s) are reading this topic

0 members, 2 guests, 0 anonymous users