Internet Engineering Task Force (IETF) K. Weller Request for Comments: XXXX Category: Experimental October 27, 2025 ISSN: 2070-1721
Hash-Based IPv6 Address Derivation for
Deterministic Name Resolution
Abstract
Internet Engineering Task Force (IETF) K. Weller Request for Comments: XXXX Category: Experimental October 27, 2025 ISSN: 2070-1721
Hash-Based IPv6 Address Derivation for
Deterministic Name Resolution
Abstract
| import re | |
| import argparse | |
| from typing import Dict, List, Set | |
| class SplunkToSigmaParser: | |
| def __init__(self): | |
| self.index_pattern = r'index=(\S+)' | |
| self.sourcetype_pattern = r'sourcetype=(\S+)' | |
| self.datamodel_pattern = r'datamodel=(\S+)' # New: Capture datamodel in base search | |
| self.field_value_pattern = r'(\w+(?:\.\w+)?)=(?:"([^"]+)"|(\S+))' # Updated: Allow datamodel.field syntax |
I hereby claim:
To claim this, I am signing this object:
| $path_ = "C:\" | |
| $list = @(Get-ChildItem -Path $path_ -Name "SolarWinds.Orion.Core.BusinessLayer.dll" -Recurse) | |
| $list | % { | |
| $fullPath = $path_ + $_ | |
| Get-FileHash $fullPath -Algorithm SHA256 | Format-List | |
| } |
| input { | |
| kafka { | |
| bootstrap_servers => "" #configurable | |
| group_id => "" #configurable | |
| auto_offset_reset => "" #configurable | |
| security_protocol => "SASL_SSL" | |
| sasl_mechanism => "SCRAM-SHA-512" | |
| sasl_jaas_config => "org.apache.kafka.common.security.scram.ScramLoginModule required username='' password='';" | |
| ssl_endpoint_identification_algorithm => "" | |
| topics => [""] #configurable |
| function Get-InjectedThread | |
| { | |
| <# | |
| .SYNOPSIS | |
| Looks for threads that were created as a result of code injection. | |
| .DESCRIPTION | |
MITRE ATT4CK - T1132 - Data Encoding
| Base64 Code | Mnemonic Aid | Decoded* | Description |
|---|---|---|---|
JAB |
🗣 Jabber | $. |
Variable declaration (UTF-16) |
TVq |
📺 Television | MZ |
MZ header |
UEs |
🏬 Upper East Side | PK |
ZIP, Office documents |
SUVY |
🚙 SUV | IEX |
PowerShell Invoke Expression |
| $ScrObjBlockRule = New-CIPolicyRule -DriverFilePath $Env:windir\System32\scrobj.dll -Level FileName -Deny -AppID $Env:windir\System32\regsvr32.exe | |
| # Merge the block rule into the allow all template rule included in the OS | |
| Merge-CIPolicy -OutputFilePath CustomASRPolicy.xml -PolicyPaths $Env:windir\schemas\CodeIntegrity\ExamplePolicies\AllowAll.xml -Rules $ScrObjBlockRule | |
| # This must be run elevated. Convert the policy to binary form and copy it to where WDAC will consume it. | |
| ConvertFrom-CIPolicy -XmlFilePath .\CustomASRPolicy.xml -BinaryFilePath $Env:windir\System32\CodeIntegrity\SIPolicy.p7b | |
| # Now reboot and the policy will take effect. |
| import time | |
| import etw | |
| import etw.evntrace | |
| import sys | |
| import argparse | |
| import threading | |
| class RundownDotNetETW(etw.ETW): | |
| def __init__(self, verbose, high_risk_only): |