<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Fix The Exchange!</title>
	<atom:link href="https://www.fixtheexchange.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.fixtheexchange.com</link>
	<description>Official Blog of Josh M. Bryant</description>
	<lastBuildDate>Tue, 09 Dec 2025 17:45:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>A Product Manager’s Guide to Meaningful AI</title>
		<link>https://www.fixtheexchange.com/2025/12/09/a-product-managers-guide-to-meaningful-ai/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-product-managers-guide-to-meaningful-ai&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-product-managers-guide-to-meaningful-ai</link>
					<comments>https://www.fixtheexchange.com/2025/12/09/a-product-managers-guide-to-meaningful-ai/#respond</comments>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Tue, 09 Dec 2025 00:31:02 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Product Management]]></category>
		<guid isPermaLink="false">https://www.fixtheexchange.com/?p=617</guid>

					<description><![CDATA[<p>Artificial Intelligence (AI) became a hot topic (again) in 2023, resulting in many companies scrambling to add some form of AI to their products. Even companies that previously viewed AI as nothing more than marketing fluff are now jumping on the AI hype train. As we approach the end of 2025, even with speculation of [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2025/12/09/a-product-managers-guide-to-meaningful-ai/">A Product Manager’s Guide to Meaningful AI</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Artificial Intelligence (AI) became a hot topic (again) in 2023, resulting in many companies scrambling to add some form of AI to their products. Even companies that previously viewed AI as nothing more than marketing fluff are now jumping on the AI hype train.</p>



<p>As we approach the end of 2025, even with speculation of an impending AI bubble burst, no one wants to be left behind. AI FOMO (fear of missing out) is at an all-time high.</p>



<p>Has AI finally moved beyond the realm of novelty? Can it add real value to your product? Or is it still just another box to check to stay relevant in the market?</p>



<p>Let’s explore this with a focus on IT and Cybersecurity products.</p>



<h2 class="wp-block-heading">AI vs traditional programming</h2>



<p>In some ways, AI can be seen as an evolution of programming languages.</p>



<p>In the early days of computing, you had machine code. Writing software, or “programming” the computer to complete a specific task, required highly specialized knowledge. This evolved into low-level programming languages (Assembly), which added a layer of abstraction. These languages were a little easier to learn than machine code but still required very specialized knowledge.</p>



<p>Over time, more layers of abstraction were added, eventually leading to the high-level programming languages (C++/Java/etc.) that most people use today. High-level programming languages still require some specialized knowledge but are easier to learn and far more accessible compared to their predecessors.</p>



<p>With each iteration, it moves further away from a language only the machine and a select few humans can understand, to a language many humans can understand.</p>



<p>AI, specifically the Generative Pre-trained Transformer (GPT)/Large Language Model (LLM) variety that launched the current AI hype train, adds yet another layer of abstraction to the human-machine interface. It removes the requirement for specialized knowledge and allows interaction between the human and the machine to occur in the human’s native language.</p>



<p>This could be seen as the next evolution of high-level programming languages.</p>



<h2 class="wp-block-heading">Is AI right for my product?</h2>



<p>To answer this, there are several questions to ask yourself first. The answers may be different depending on what your product is, and what your product does.&nbsp; For our purposes, we’ll focus on IT and Cybersecurity software products.</p>



<h3 class="wp-block-heading">Does it add value?</h3>



<p>Any new feature added to any type of product must add value. If adding AI to the product does not increase the value proposition for the end user, what’s the point?</p>



<p>If you can’t answer this question confidently with a “yes”, do not add AI to the product, do not pass go, do not collect $200.</p>



<p>There are several ways AI can potentially add value, so let’s break this down even further.</p>



<ul class="wp-block-list">
<li><strong>Speed:</strong> Does it significantly reduce the time it takes to complete a task (i.e. triage an alert or write a script)? If I still have to double-check every single output, I haven&#8217;t saved any time.</li>



<li><strong>Accessibility:</strong> Does it allow a junior employee to perform tasks that usually require a senior employee? This is the &#8220;abstraction&#8221; benefit I mentioned earlier.</li>



<li><strong>Insight:</strong> Can it find patterns that a human would miss? We are drowning in data. AI is good with large volumes of data. Humans are not.</li>
</ul>



<p>If the AI feature is just a &#8220;chatbot&#8221; that acts like a glorified search bar, it probably isn&#8217;t adding enough value to justify the cost.</p>



<h3 class="wp-block-heading">Is it the right tool for the job?</h3>



<p>When people say &#8220;AI&#8221; right now, they almost always mean Generative AI (GenAI) or LLMs, but that is just one piece of the puzzle.</p>



<p>GenAI is great for creating content or explaining complex topics. It is not always the best tool for analyzing massive datasets or spotting trends.</p>



<p>If you are trying to detect network anomalies or catch a brute force attack, an LLM is likely the wrong choice. It is often too slow and too expensive for that kind of math.</p>



<p>This is where traditional Machine Learning (ML) shines. ML has been the backbone of cybersecurity products for years. It is excellent at crunching numbers to find the needle in the haystack.</p>



<p>An LLM may add value when used in combination with other tools, such as an orchestrator in an Agentic workflow deciding which tool calls to make to accomplish the desired results or summarizing complex output from another tool.</p>



<p>Don&#8217;t force GenAI into a problem that ML (or even a simple regex script) can solve better. Use the right tool(s) for the job, not just the one that is currently trending on social media.</p>



<h3 class="wp-block-heading">Is it accurate?</h3>



<p>This is the big one. In the world of GenAI, we call mistakes &#8220;hallucinations.&#8221; In the world of Cybersecurity, we call mistakes &#8220;incidents.&#8221;</p>



<p>If I ask an AI to generate an image of man outstanding in his field, and it gives him an extra finger, nobody gets hurt. If I ask an AI to write a script to remove a user and it hallucinates a command that deletes <em>everything</em> from my Identity Provider, we have a major problem.</p>



<p>You have to ask if the AI model is reliable enough for the task at hand. If the user has to spend 20 minutes prompt engineering and fact-checking the AI to get a simple answer, the tool has failed. It needs to work, it needs to be efficient, and it needs to be right.</p>



<h3 class="wp-block-heading">Is it transparent?</h3>



<p>AI output can’t be a &#8220;black box.&#8221; In security, we need to know the <em>why</em> behind an answer. If AI presents a finding, it should cite the specifics that triggered the conclusion. If there’s no trail back to the source, how do we know we can trust it? Transparency is key. You must be able to “trust but verify” all output.</p>



<h3 class="wp-block-heading">Is it secure?</h3>



<p>We can’t talk about AI in the enterprise without talking about data privacy.</p>



<p>To get a good answer from AI, you usually have to feed it data. In our industry, that data is often sensitive. It might be proprietary code, customer PII, or some other form of sensitive data.</p>



<p>Where does that data go? Is it being used to train a public model? If you paste a strictly confidential file into a public AI tool, you might have just leaked your company secrets to the world.</p>



<p>If your product introduces AI, you must be able to guarantee that customer data stays with the customer. The moment data leaves the safety of the tenant; you introduce a new risk vector.</p>



<h3 class="wp-block-heading">Is it cost effective?</h3>



<p>Even if your chosen form of AI has checked all the other boxes so far, you must still ask “is it cost effective?”.&nbsp; If adding AI to a product blows up your operating budget, it becomes a non-starter. If the same results can be achieved through cheaper traditional methods, what value is AI really adding to your product?</p>



<h2 class="wp-block-heading">The Verdict</h2>



<p>AI is an incredible tool. It has the potential to change how we interact with technology fundamentally, but it is not a magic wand.</p>



<p>Don&#8217;t just add AI because everyone else is doing it. Add it because it solves a specific problem. Add it because it makes your users&#8217; lives easier. Add it because it makes them more secure.</p>



<p>If you can check those boxes, you are on the right track. If not, you are just adding noise.</p>



<p></p><p>The post <a href="https://www.fixtheexchange.com/2025/12/09/a-product-managers-guide-to-meaningful-ai/">A Product Manager’s Guide to Meaningful AI</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.fixtheexchange.com/2025/12/09/a-product-managers-guide-to-meaningful-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Time for another revival.</title>
		<link>https://www.fixtheexchange.com/2025/12/05/time-for-another-revival/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=time-for-another-revival&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=time-for-another-revival</link>
					<comments>https://www.fixtheexchange.com/2025/12/05/time-for-another-revival/#respond</comments>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 18:16:08 +0000</pubDate>
				<category><![CDATA[Personal News]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.fixtheexchange.com/?p=607</guid>

					<description><![CDATA[<p>After 6 years of silence, plus a month of downtime&#8230; Now with 100% more containers and an all-new look! Where have I been? Busy with work mostly. After I last posted in 2019, I got very busy launching a proactive lateral movement risk assessment tool called &#8220;Impact&#8221; at Tanium. Then the pandemic hit, which put [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2025/12/05/time-for-another-revival/">Time for another revival.</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>After 6 years of silence, plus a month of downtime&#8230;</p>



<figure class="wp-block-image aligncenter size-full"><img fetchpriority="high" decoding="async" width="220" height="308" src="https://www.fixtheexchange.com/wp-content/uploads/2025/12/futurama-bender-back-baby01.gif" alt="" class="wp-image-610"/></figure>



<p>Now with 100% more containers and an all-new look!</p>



<h3 class="wp-block-heading">Where have I been?</h3>



<p>Busy with work mostly. After I last posted in 2019, I got very busy launching a proactive lateral movement risk assessment tool called <a href="https://www.tanium.com/blog/map-lateral-movement-tanium-impact-tech-talks-123/" data-type="link" data-id="https://www.tanium.com/blog/map-lateral-movement-tanium-impact-tech-talks-123/">&#8220;Impact&#8221; at Tanium</a>. Then the pandemic hit, which put my public speaking adventures on pause, but didn&#8217;t make things any less busy.  I, along with several colleagues, successfully launched Impact in June of 2020, and I transitioned from the Director of Product Management role I had at the time, to a Senior Director SME Lead role. </p>



<h4 class="wp-block-heading">2020-2023</h4>



<p>For the next couple years, I&#8217;d be responsible for as many as 6 products at once (Impact, Integrity Monitor, Reveal, Comply, and Risk), plus 4 shared services/components (Criticality, Directory Query, Index, and Recorder). As you can imagine, that much responsibility leaves little time for things like blogging.</p>



<p>Fast forward to November of 2022, a reorg changes my title to Director of Technical Product Management, and along with it my workload. Fewer products, but different responsibilities. For most of the next year, I&#8217;d manage only 2 products (File Integrity Monitor and Reveal), and 2 shared components (Index and Recorder).</p>



<h4 class="wp-block-heading">2023-2025</h4>



<p>In the 4th quarter of 2023, I, along with 3 other colleagues would finally be <a href="https://patents.google.com/patent/US11831670B1/en">awarded a patent for Impact</a> that was filed back in 2019 when we first started working on it (#brain4life). Another reorg brought yet another change in responsibilities.  I helped launch<a href="https://www.tanium.com/blog/tanium-investigate-tech-talks-73/" data-type="link" data-id="https://www.tanium.com/blog/tanium-investigate-tech-talks-73/"> Tanium&#8217;s newest product at the time, called &#8220;Investigate&#8221;</a>, and became the Product Manager for Impact once again.</p>



<p>After another reorg in February of 2025, &#8220;Technical&#8221; was dropped from my title, changing it to just &#8220;Director of Product Management&#8221;. There was never any distinction between &#8220;TPM&#8221; and &#8220;PM&#8221; at the company anyway, everyone had to do the same work no matter which title you had.</p>



<p>Halloween morning, October 31st, 2025, brought the biggest change yet. After 7.5 years at Tanium, I was <a href="https://www.linkedin.com/posts/josh-m-bryant_today-is-my-last-official-day-at-tanium-activity-7390410925301948417-cWpd?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAcMJe8BNvX0Zru_36kd5rd0EGensNGG0s8" data-type="link" data-id="https://www.linkedin.com/posts/josh-m-bryant_today-is-my-last-official-day-at-tanium-activity-7390410925301948417-cWpd?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAcMJe8BNvX0Zru_36kd5rd0EGensNGG0s8">unexpectedly laid off</a>. There&#8217;s a surprising number of things that have to get done after a layoff. It&#8217;s a busier time than you might expect.</p>



<h3 class="wp-block-heading">Getting back online</h3>



<p>A series of odd coincidences took my blog offline the first week of November. First there was a Cloudflare outage, then something happened with my ISP that prevented inbound traffic from reaching my network. After several weeks of back and forth trying to figure it out, the ISP issue was resolved, inbound traffic was finally hitting my router, but still not reaching my webserver.</p>



<p>After a little more troubleshooting, I discovered that a recent update to my Unifi Dream Machine Pro SE had migrated firewall policies to their new Zone Firewall feature. My webserver was connected to a Unifi Aggregation Pro switch (a Layer 3 switch) and set to use it as its router. Apparently, Ubiquiti didn&#8217;t think to support Zone assignments when using one of their Layer 3 switches as a router. After changing the network configuration to use the UDM Pro SE as the router, I was able to assign the network the webserver was on to a zone. </p>



<h4 class="wp-block-heading">Goodbye LAMP, Hello Docker!</h4>



<p>When I first started my blog way back in 2011, I built it on a LAMP (Linux, Apache, MySQL, and PHP) VM, based on CentOS 6 with Drupal. After an upgrade to CentOS 7, and the famous &#8220;Drupalgeddon&#8221; vulnerability, I moved it to WordPress. </p>



<p>The LAMP VM migrated between various different physical hosts and hypervisors over the years and underwent several upgrades. Even though I wasn&#8217;t actively posting, I was trying to keep it online and up to date, as it&#8217;s always had a steady flow of traffic. Its final iteration before containerization was a CentOS 9 running on TrueNAS SCALE 25.10.</p>



<p>While troubleshooting the series of coincidences that took the blog offline, I decided to migrate it to an &#8220;App&#8221; (Docker Container) on my TrueNAS SCALE server. This should greatly simplify maintenance. I also decided to update the look and feel.  </p>



<p>Unfortunately, images failed to migrate, so some older posts may have broken image links. I still have the images and will manually fix them as time permits. However, because it mostly posts that don&#8217;t get a lot of traffic that have broken image links, I&#8217;m not in any rush.</p>



<h3 class="wp-block-heading">What&#8217;s next?</h3>



<p>Jobwise, I don&#8217;t know yet. As of the time of this post, I&#8217;m still unemployed, which is a strange new thing for me. I have some interviews in-progress, but between end of year financials and the holidays, it&#8217;s very slow going. I expect things to pick up after New Years. I&#8217;m also exploring the possibility of founding my own startup.</p>



<p>As far as the blog is concerned, expect to see more posts, but on a new variety of topics. I&#8217;ve been away from Exchange for quite some time, so there will be less of that. Instead, you can expect to see more on Cybersecurity, Product Management, Automation, and Artificial Intelligence, so stay tuned!</p><p>The post <a href="https://www.fixtheexchange.com/2025/12/05/time-for-another-revival/">Time for another revival.</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.fixtheexchange.com/2025/12/05/time-for-another-revival/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Defending Active Directory Against Cyberattacks</title>
		<link>https://www.fixtheexchange.com/2019/11/22/defending-active-directory-against-cyberattacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=defending-active-directory-against-cyberattacks&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=defending-active-directory-against-cyberattacks</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Fri, 22 Nov 2019 14:50:32 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Conference Talks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/?p=460</guid>

					<description><![CDATA[<p>Back in April of 2016, Zaid Arafeh, Clare Kearney, and I, recorded a 7 part series for the Microsoft Virtual Academy titled &#8220;Defending Active Directory against Cyberattacks&#8221;. Unfortunately Microsoft retired the Virtual Academy and most of the recordings are no longer available. Some of the content is now part of this edX course on Managing [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2019/11/22/defending-active-directory-against-cyberattacks/">Defending Active Directory Against Cyberattacks</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Back in April of 2016, <a href="https://www.linkedin.com/in/zarafeh/">Zaid Arafeh</a>, <a href="https://www.linkedin.com/in/clare-kearney-pmp-0abb9a2a/">Clare Kearney</a>, and I, recorded a 7 part series for the Microsoft Virtual Academy titled &#8220;Defending Active Directory against Cyberattacks&#8221;.  Unfortunately Microsoft retired the Virtual Academy and most of the recordings are no longer available.  Some of the content is now part of this <a href="https://www.edx.org/course/managing-identity">edX course on Managing Identity</a>.</p>



<p>I recently had someone reach out to me on Twitter and ask if I still had a copy of the slides from this series.  After some searching, I was able to locate them. Slides for all 7 sessions are now available here below:</p>



<div class="wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained">
<div class="wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-ce155fab wp-block-group-is-layout-flex">
<div class="wp-block-group is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-fc9f69e7 wp-block-group-is-layout-flex">
<iframe src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21449043&amp;authkey=AC9MThQF0IC487M&amp;em=2" width="402" height="327" frameborder="0" scrolling="no"></iframe>
</div>



<iframe src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21449042&amp;authkey=AGHrQLhG7a3RxuM&amp;em=2" width="402" height="327" frameborder="0" scrolling="no"></iframe>



<iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21449052&amp;authkey=AMOKQ4oPYsOcJ20&amp;em=2" width="402" height="327" frameborder="0" scrolling="no"></iframe>
</div>
</div>



<div class="wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-ce155fab wp-block-group-is-layout-flex">
<div class="wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex">
<iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21449044&amp;authkey=ADcYZxSHObhPbJ0&amp;em=2" width="402" height="327" frameborder="0" scrolling="no"></iframe>
</div>



<iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21449039&amp;authkey=AKyUN4oOnmPJuL8&amp;em=2" width="402" height="327" frameborder="0" scrolling="no"></iframe>



<div class="wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex">
<iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&#038;resid=82B6A7B69DE71D22%21449026&#038;authkey=AECY6SujFtsNaU4&#038;em=2" width="402" height="327" frameborder="0" scrolling="no"></iframe>
</div>
</div>



<div class="wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-ce155fab wp-block-group-is-layout-flex">
<iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21449051&amp;authkey=AExeBhgh0W2hmdk&amp;em=2" width="402" height="327" frameborder="0" scrolling="no"></iframe>
</div><p>The post <a href="https://www.fixtheexchange.com/2019/11/22/defending-active-directory-against-cyberattacks/">Defending Active Directory Against Cyberattacks</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hunting Webshells: Tracking TwoFace</title>
		<link>https://www.fixtheexchange.com/2019/09/09/hunting-webshells-tracking-twoface/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hunting-webshells-tracking-twoface&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hunting-webshells-tracking-twoface</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Mon, 09 Sep 2019 14:47:24 +0000</pubDate>
				<category><![CDATA[Conference Talks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exchange]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/?p=405</guid>

					<description><![CDATA[<p>Microsoft Exchange Servers are a high-value target for many adversaries, which makes the investigation of them during Incident Response vital. Backdoor implants in the form of webshells and IIS modules on servers are on the rise. Find out how to hunt webshells and differentiate between legitimate use and attacker activity, using default logging available on [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2019/09/09/hunting-webshells-tracking-twoface/">Hunting Webshells: Tracking TwoFace</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Microsoft Exchange Servers are a high-value target for many adversaries, which makes the investigation of them during Incident Response vital. Backdoor implants in the form of webshells and IIS modules on servers are on the rise. Find out how to hunt webshells and differentiate between legitimate use and attacker activity, using default logging available on every exchange server. The presentation will feature real-world examples carried out by an adversary group using web-based  backdoors to breach and maintain access to networks of targeted organizations in the Middle East. </p>



<p>This talk has evolved over the last few years. I originally came up with the idea for this talk in 2016 after some friends and colleagues of mine from Microsoft&#8217;s Global Incident Response team (now called Detection and Response Team) reached out to me for help analyzing a webshell they&#8217;d found at a customer.  By this point I had analyzed a few different webshells targeting Exchange Servers, and thus the original version of this talk, titled &#8220;<a href="http://www.fixtheexchange.com/hunting-webshells-on-microsoft-exchange-server/">Hunting Webshells on Microsoft Exchange Server</a>&#8221; was born and delivered at the 2017 SANS Threat Hunting Summit.  At the time I had no idea what to call this webshell. <br><br>Shortly after SANS released the recording of that talk, Palo Alto&#8217;s Unit 42 released a blog post by Robert Falcone, who called this webshell &#8220;TwoFace&#8221;.  Robert and I started talking and decided to combine our research and co-present the next version of this talk. It was accepted by and delivered at the 2018 SANS Threat Hunting Summit.   Video and slides from that version can be found below.<br><br>In 2019, we decided to update this talk again.  We ended up delivering it at DerbyCon 9: Finish Line.  Video and slides from this version can be found below as well.<br><br> If you would like this talk presented at your event or conference, please contact me on <a href="https://twitter.com/fixtheexchange">Twitter</a> or <a href="http://www.linkedin.com/in/josh-m-bryant">LinkedIn</a>. </p>



<figure><iframe loading="lazy" width="560" height="315" src="https://www.youtube.com/embed/ClBdUKMjFPs" allowfullscreen=""></iframe></figure>



<figure><iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21447560&amp;authkey=AOBl0Tf4xcG_yIU&amp;em=2" width="402" height="327"></iframe></figure>



<figure class="wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Hunting Webshells: Tracking TwoFace - SANS Threat Hunting Summit 2018" width="500" height="281" src="https://www.youtube.com/embed/GjquFKa4afU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<figure><iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21444200&amp;authkey=AFl-zR3hwkDci4U&amp;em=2" width="402" height="327"></iframe></figure><p>The post <a href="https://www.fixtheexchange.com/2019/09/09/hunting-webshells-tracking-twoface/">Hunting Webshells: Tracking TwoFace</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The ABCs of Containment, Eradication, and Recovery</title>
		<link>https://www.fixtheexchange.com/2019/08/30/the-abcs-of-containment-eradication-and-recovery/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-abcs-of-containment-eradication-and-recovery&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-abcs-of-containment-eradication-and-recovery</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Fri, 30 Aug 2019 21:38:59 +0000</pubDate>
				<category><![CDATA[Conference Talks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/?p=439</guid>

					<description><![CDATA[<p>In the physical realm, a successful hunt ends with either a kill or a capture.  While some might enjoy the thrill of the hunt, no one really wants to walk away empty handed.  Why do we treat hunting in the digital realm differently?  The Containment, Eradication, and Recovery phase of the Incident Response Lifecycle is the digital equivalent [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2019/08/30/the-abcs-of-containment-eradication-and-recovery/">The ABCs of Containment, Eradication, and Recovery</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>In the physical realm, a successful hunt ends with either a kill or a capture.  While some might enjoy the thrill of the hunt, no one really wants to walk away empty handed.  Why do we treat hunting in the digital realm differently?  The Containment, Eradication, and Recovery phase of the Incident Response Lifecycle is the digital equivalent of the kill or capture in the physical world.  Proper execution of this phase is necessary for a successful hunt, and it’s as easy as remembering your ABCs.  You’ve stalked and located your prey, evil has been found, are you prepared to take it out? <br><br>I gave this talk at the <a href="https://www.gosec.net/en/speakers/#joshmbryant">GoSec</a> 2019 conference in Montreal, the 2019 <a href="https://texascybersummitii2019.sched.com/event/WEqn?iframe=no">Texas Cyber Summit</a> in San Antonio, and the 2019 <a href="https://conference.forensik.ca/session/abc-du-confinement-de-l-eradication-et-de-ala-recuperation/">Forensik</a> conference in Montreal. Slides are available below.  I&#8217;d like to give a shout out to <a href="https://twitter.com/PowershellPoet">Michael Melone</a>, who I believe originally came up with the &#8220;ABCs&#8221;,  Jared Poeppleman for writing the <a href="https://gallery.technet.microsoft.com/Reset-the-krbtgt-account-581a9e51">krbtgt reset script</a>, as well as <a href="https://twitter.com/_wald0">Andrew Robbins</a> and his team for creating the <a href="https://github.com/BloodHoundAD/BloodHound">Bloodhound tool</a>, all of which are referenced in these slides. <br><br>If you are interested in having this talk delivered at your event or conference, please contact me through <a href="https://twitter.com/fixtheexchange">Twitter</a> or <a href="http://www.linkedin.com/in/josh-m-bryant">LinkedIn</a>.    </p>



<figure><iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21447246&amp;authkey=AAeYnrJMEBCPYhs&amp;em=2" width="402" height="327"></iframe></figure><p>The post <a href="https://www.fixtheexchange.com/2019/08/30/the-abcs-of-containment-eradication-and-recovery/">The ABCs of Containment, Eradication, and Recovery</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Best of Both Worlds: Blending Tactics from the Public and Private Sectors</title>
		<link>https://www.fixtheexchange.com/2019/08/30/best-of-both-worlds-blending-tactics-from-the-public-and-private-sectors/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=best-of-both-worlds-blending-tactics-from-the-public-and-private-sectors&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=best-of-both-worlds-blending-tactics-from-the-public-and-private-sectors</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Fri, 30 Aug 2019 18:41:04 +0000</pubDate>
				<category><![CDATA[Conference Talks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/?p=448</guid>

					<description><![CDATA[<p>Public and private enterprises face the same threats, and yet often have different approaches to defense. What if you could take some of the best tactics from each and blend them together? What if I told you this is already happening in small pockets around the US? Enhance your defenses by studying the strengths and [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2019/08/30/best-of-both-worlds-blending-tactics-from-the-public-and-private-sectors/">Best of Both Worlds: Blending Tactics from the Public and Private Sectors</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Public and private enterprises face the same threats, and yet often have different approaches to defense. What if you could take some of the best tactics from each and blend them together? What if I told you this is already happening in small pockets around the US? Enhance your defenses by studying the strengths and weaknesses of each sector and blending tactics from both. </p>



<p>This talk was original presented at the 2019 SANS Enterprise Defense Summit. Slides are available below. <br><br>If you are interested in having this talk delivered at your event or conference, please contact me through <a href="https://twitter.com/fixtheexchange">Twitter</a> or <a href="http://www.linkedin.com/in/josh-m-bryant">LinkedIn</a>. </p>



<figure><iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21445732&amp;authkey=AEbEj-9Ft3zZG9c&amp;em=2" width="402" height="327"></iframe></figure><p>The post <a href="https://www.fixtheexchange.com/2019/08/30/best-of-both-worlds-blending-tactics-from-the-public-and-private-sectors/">Best of Both Worlds: Blending Tactics from the Public and Private Sectors</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Hitchhiker&#8217;s Guide to Data Breaches</title>
		<link>https://www.fixtheexchange.com/2019/08/30/the-hitchhikers-guide-to-data-breaches/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-hitchhikers-guide-to-data-breaches&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-hitchhikers-guide-to-data-breaches</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Fri, 30 Aug 2019 16:17:42 +0000</pubDate>
				<category><![CDATA[Conference Talks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/?p=442</guid>

					<description><![CDATA[<p>The results are in, you’ve been breached. It’s officially the worst day of your career. How will you handle what comes next? Are you prepared to navigate the long road to recovery? Where do you even begin? Come, hitch a ride with me, I’ll show you the way. Lessons learned from dozens of compromise recoveries [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2019/08/30/the-hitchhikers-guide-to-data-breaches/">The Hitchhiker’s Guide to Data Breaches</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The results are in, you’ve been breached. It’s officially the worst day of your career. How will you handle what comes next? Are you prepared to navigate the long road to recovery? Where do you even begin? Come, hitch a ride with me, I’ll show you the way. Lessons learned from dozens of compromise recoveries across a variety of industries from around the world. Advice on evicting your adversary, answering to Executives, and recovering from the trauma of a cyberattack, to help you better prepare for the inevitable breach. Turn your worst day around, just don’t forget your towel!  </p>



<p>This talk was given at the 2017 SANS Data Breach Summit, and the 2018 Camp IT Enterprise Risk / Security Management conference to audiences of Executives and Legal Council.  Recently a few people expressed interest in seeing the slide deck from this talk, so I&#8217;m making it available here.  </p>



<p>If you are interested in having this talk delivered at your event or conference, please contact me through <a href="https://twitter.com/fixtheexchange">Twitter</a> or <a href="http://www.linkedin.com/in/josh-m-bryant">LinkedIn</a>.   </p>



<figure><iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21434638&amp;authkey=APwbe_yL2xeFoRQ&amp;em=2" width="402" height="327"></iframe></figure><p>The post <a href="https://www.fixtheexchange.com/2019/08/30/the-hitchhikers-guide-to-data-breaches/">The Hitchhiker’s Guide to Data Breaches</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reducing the Exchange and Active Directory Attack Surface</title>
		<link>https://www.fixtheexchange.com/2019/02/12/reducing-the-exchange-and-active-directory-attack-surface/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reducing-the-exchange-and-active-directory-attack-surface&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reducing-the-exchange-and-active-directory-attack-surface</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Tue, 12 Feb 2019 22:16:04 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Exchange 2010]]></category>
		<category><![CDATA[Exchange 2013]]></category>
		<category><![CDATA[Exchange 2016]]></category>
		<category><![CDATA[Exchange 2019]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/?p=403</guid>

					<description><![CDATA[<p>Three years ago I wrote a document titled &#8220;Removing Exchange&#8217;s ability to impact Tier 0 and Tier 1&#8221; that was distributed internally at Microsoft as well as to dozens of Microsoft customers as part of Cybersecurity services delivered through Microsoft Consulting Services (MCS). I had always intended to get this document published publicly, but for [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2019/02/12/reducing-the-exchange-and-active-directory-attack-surface/">Reducing the Exchange and Active Directory Attack Surface</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Three years ago I wrote a document titled &#8220;Removing Exchange&#8217;s ability to impact Tier 0 and Tier 1&#8221; that was distributed internally at Microsoft as well as to dozens of Microsoft customers as part of Cybersecurity services delivered through Microsoft Consulting Services (MCS).</p>



<p>I had always intended to get this document published publicly, but for one reason or another, it never happened.   With <a href="https://support.microsoft.com/en-us/help/4490059/using-shared-permissions-model-to-run-exchange-server">KB4490059</a> being released in response to <a href="https://twitter.com/_dirkjan">@_dirkjan</a>&#8216;s <a href="https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/">#PriveExchange</a> vulnerability, I&#8217;ve decided it&#8217;s beyond time to just share it here on my blog.  <a href="https://support.microsoft.com/en-us/help/4490059/using-shared-permissions-model-to-run-exchange-server">KB4490059</a> is a step in the right direction. You can add these mitigations on top of it for even further protections, or perhaps find a more compelling reason to switch to the Active Directory Split Permissions model. </p>



<p><strong>Removing Exchange&#8217;s ability to impact Tier 0 and Tier 1</strong></p>



<p>Exchange is tightly integrated with Active Directory. When Exchange is installed, the Active Directory Schema is extended, and several highly privileged groups are created. These privileged groups are granted rights to a large number of objects within Active Directory.  A compromised Exchange Server can easily lead to complete control of Tier 1, and in many instances Tier 0. </p>



<p>For more information on the Tier model, see “<a href="https://technet.microsoft.com/en-us/library/mt631194.aspx">Securing Privileged Access</a>”.
</p>



<p>In Exchange 2010 and later, there are two options for
mitigating this risk. Both should be evaluated carefully before implementation.
It is only necessary to implement one of these two options. </p>



<p><strong>Mitigation Option 1 –
Implement the Active Directory Split Permissions Model</strong></p>



<p>Starting with Exchange 2010, there are <a href="https://technet.microsoft.com/en-us/library/dd638106(v=exchg.141).aspx">three Permissions Models available</a>.
Of the three, the <a href="https://technet.microsoft.com/en-us/library/dd638106(v=exchg.141).aspx#ADSplit">Active Directory Split Permissions Model</a>,
is the only one that can mitigate this risk without additional modifications to
Active Directory. Because this model does not allow Exchange to modify security
principles (i.e. create/delete/reset password) or group membership (i.e. add
members to security groups that may grant access to other systems), compromise
of an Exchange Server is contained to the Exchange environment when running
under this permissions model.</p>



<p>This permissions model isn’t for everyone. You should
carefully consider the impact switching to Active Directory Split Permissions
may have on your organization. It may require a significant change in user
provisioning, business practices, or workflows that revolve around Exchange. It
is also important to note that while this permissions model is fully supported
by the Exchange Product Group, it does not receive the same level of testing as
the default Shared Permissions model.</p>



<p>If you’ve determined that the Active Directory Split
Permissions Model is right for your organization, you can switch to it by
running the following setup command:</p>



<p>setup.com
/PrepareAD /ActiveDirectorySplitPermissions:true</p>



<p>For
more information on configuring split permissions, see “<a href="https://technet.microsoft.com/en-us/library/dd638155(v=exchg.141).aspx">Configure Exchange 2010 for Split Permissions</a>”.</p>



<p>Implementing the Active Directory Split Permissions model
both removes Exchange from Tier 0, placing it in Tier 1, and reduces potential
impact to Tier 1.</p>



<p><strong>Mitigation Option 2 –
Reduce privileges granted to Exchange in Active Directory</strong></p>



<p>If your organization needs to use the default Shared
Permissions Model, the RBAC Split Permissions Model, or still has legacy
versions of Exchange present, modifications to permissions in Active Directory
are required to mitigate this risk.</p>



<p>To remove Exchange’s potential to impact to Tier 0,
permissions granted to Exchange’s privileged groups must be removed from the Access
Control List (ACL) on the following groups and their members in all domains
within the Active Directory Forest Exchange has been installed in, to include
any nested groups and members of those nested groups.</p>



<ul class="wp-block-list"><li>Enterprise
Admins</li><li>Domain
Admins</li><li>Schema
Admin</li><li>BUILTIN\Administrators</li><li>Account
Operators</li><li>Backup
Operators</li><li>Print
Operators</li><li>Server
Operators</li><li>Domain
Controllers</li><li>Read-only
Domain Controllers</li><li>Group
Policy Creators Owners</li><li>Cryptographic
Operators</li><li>Other
Delegated Groups</li></ul>



<p>With the exception of the last 3 entries above, these groups
should already be protected by AdminSDHolder, which prevents them from
inheriting permissions that would allow Exchange’s privileged groups (Exchange
Trusted Subsystem, Exchange Windows Permissions, Organization Management, etc.)
to take control of them. Members of these groups should have the same
protection. However, since Account Operators, Backup Operators, Print
Operators, and Server Operators, can be excluded from AdminSDHolder protection,
it is worthwhile to take the extra step of removing Exchange’s permission to
all of the above groups (if present).</p>



<p>Because the permissions are inherited, the easiest way to
accomplish this, is to place all Tier 0 users and groups into the same OU,
block inheritance on that OU, and restrict permissions on the ACL for that OU.
Full Control (GenericAll), Write (GenericWrite), Modify Permissions
(WriteDacl), Write Member (WriteMember), and Change Password (note that Change
Password permissions should NOT be removed from “Everyone” or “SELF”), are the
permissions that should be removed from any object that should not have the
ability to manipulate Tier 0 OUs/users/groups. In most cases the entire
security principal can be removed from the Tier 0 OUs/users/groups.</p>



<p>To remove Exchange’s potential to impact Tier 1, a similar
approach to the above must be taken.&nbsp;
Exchange’s permissions on the ACLs of users and groups with privileged
access to Tier 1 assets.</p>



<p>Because the permissions are inherited, the easiest way to
accomplish this, is to place all Tier 1 privileged users and groups into the
same OU, block inheritance on that OU, and restrict permissions on the ACL for
that OU. Full Control (GenericAll), Write (GenericWrite), Modify Permissions
(WriteDACLl), and Write Member (WriteMember), are the permissions that should
be removed from any object that should not have the ability to manipulate Tier
1 privileged users/groups. In most cases the entire security principal can be
removed from the ACL on the Tier 1 OUs/users/groups.</p>



<p>For example, Exchange should not have permissions to an
account or group that grants privileged access to a SQL server.</p>



<p>Privileged accounts and groups should NOT be mail enabled.
Therefore removing Exchange’s permissions from them should have no negative
impact on operations.&nbsp; If an account
with, or a group used to grant privileged access to, any system, regardless of
what tier it resides in, has been mail enabled, privileges should either by
removed, or they should be mail disabled. Either way, it may be necessary to
create unprivileged accounts/groups for mail use, or non-mail enabled
accounts/groups for privileged access use, in order to avoid disruptions.</p>



<p>This approach is not tested by the Exchange Product Group. Failure to exercise caution when implementing this approach could result in damage to the Exchange environment. </p>



<p><strong>Additional
Considerations</strong></p>



<p>Service Packs and Cumulative Updates in Exchange often
include Schema updates to Active Directory. Because <a href="https://technet.microsoft.com/en-us/library/bb125224(v=exchg.160).aspx">Schema extensions and Active Directory
preparation</a> require Schema Admins and Enterprise
Admins privileges, this portion of updating Exchange is a Tier 0 operation.
Schema extensions and Active Directory preparation must be performed from a
Tier 0 Privileged Access Workstation (PAW).</p>



<p>Schema extension and Active Directory preparation performed
during an update to Exchange may overwrite some Exchange related settings in
Active Directory. It is recommended that permissions on Tier 0 and Tier 1 set
according to the guidance above are validated after every Exchange update install.</p><p>The post <a href="https://www.fixtheexchange.com/2019/02/12/reducing-the-exchange-and-active-directory-attack-surface/">Reducing the Exchange and Active Directory Attack Surface</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hunting Webshells on Microsoft Exchange Server</title>
		<link>https://www.fixtheexchange.com/2017/05/08/hunting-webshells-on-microsoft-exchange-server/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hunting-webshells-on-microsoft-exchange-server&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hunting-webshells-on-microsoft-exchange-server</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Mon, 08 May 2017 14:15:40 +0000</pubDate>
				<category><![CDATA[Conference Talks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Exchange 2013]]></category>
		<category><![CDATA[Exchange 2016]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/hunting-webshells-on-microsoft-exchange-server/</guid>

					<description><![CDATA[<p>Microsoft Exchange Servers are a high value target, making investigation of them during Incident Response vital, but where do you start? What should you look for? Backdoor implants in the form of webshells hiding in OWA are on the rise. Find out how to hunt webshells and differentiate between legitimate use and attacker activity, using [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2017/05/08/hunting-webshells-on-microsoft-exchange-server/">Hunting Webshells on Microsoft Exchange Server</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Microsoft Exchange Servers are a high value target, making investigation of them during Incident Response vital, but where do you start? What should you look for? Backdoor implants in the form of webshells hiding in OWA are on the rise. Find out how to hunt webshells and differentiate between legitimate use and attacker activity, using default logging available on every Exchange Server, through real world examples. It’s easier than you might think, and these techniques can help up your DFIR game in environments containing Exchange Servers!</p>



<p>This talk was originally presented at the 2017 SANS Threat Hunting and Incident Response Summit.  A recording of this talk and the slide deck from it are available below.  If you would like an updated version of this talk presented at your event or conference, please contact me on  <a href="https://twitter.com/fixtheexchange">Twitter</a> or <a href="http://www.linkedin.com/in/josh-m-bryant">LinkedIn</a>.</p>



<figure><iframe loading="lazy" width="560" height="315" src="https://www.youtube.com/embed/AbQ_4R5Z5Fg" allowfullscreen=""></iframe></figure>



<figure><iframe loading="lazy" src="https://onedrive.live.com/embed?cid=82B6A7B69DE71D22&amp;resid=82B6A7B69DE71D22%21435197&amp;authkey=AMxykzdQ12vPU4g&amp;em=2" width="402" height="327"></iframe></figure><p>The post <a href="https://www.fixtheexchange.com/2017/05/08/hunting-webshells-on-microsoft-exchange-server/">Hunting Webshells on Microsoft Exchange Server</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Join me at the 2017 SANS Threat Hunting and Incident Response Summit &#8211; April 18th and 19th</title>
		<link>https://www.fixtheexchange.com/2016/12/13/join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Tue, 13 Dec 2016 11:13:14 +0000</pubDate>
				<category><![CDATA[Conference Talks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DFIR]]></category>
		<category><![CDATA[Exchange 2010]]></category>
		<category><![CDATA[Exchange 2013]]></category>
		<category><![CDATA[Exchange 2016]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th/</guid>

					<description><![CDATA[<p>I&#8217;ll be presenting a brand new session titled &#8220;Hunting Webshells on Microsoft Exchange Server&#8221; at the 2017 SANS Threat Hunting and Incident Response Summit in New Orleans on April 18th and 19th! My session abstract:&#8220;Microsoft Exchange Servers are a high value target, making investigation of them during Incident Response vital, but where do you start? [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2016/12/13/join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th/">Join me at the 2017 SANS Threat Hunting and Incident Response Summit – April 18th and 19th</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ll be presenting a brand new session titled &#8220;Hunting Webshells on Microsoft Exchange Server&#8221; at the 2017 SANS Threat Hunting and Incident Response Summit in New Orleans on April 18th and 19th!</p>
<p><strong>My session abstract:</strong><br />&#8220;Microsoft Exchange Servers are a high value target, making investigation of them during Incident Response vital, but where do you start? What should you look for? Backdoor implants in the form of webshells hiding in OWA are on the rise. Find out how to hunt webshells and differentiate between legitimate use and attacker activity, using default logging available on every Exchange Server, through real world examples. It’s easier than you might think, and these techniques can help up your DFIR game in environments containing Exchange Servers!&#8221;</p>
<p><strong>Full agenda: </strong><a href="https://www.sans.org/event-downloads/45247/agenda.pdf">https://www.sans.org/event-downloads/45247/agenda.pdf</a></p>
<p><strong>More details: </strong><a href="https://www.sans.org/event/threat-hunting-and-incident-response-summit-2017">https://www.sans.org/event/threat-hunting-and-incident-response-summit-2017</a></p>
<p>If you can&#8217;t make the summit, a recording should be available afterwards.&nbsp; I&#8217;ll post a link to the recording and a detailed blog on this subject when available.</p><p>The post <a href="https://www.fixtheexchange.com/2016/12/13/join-me-at-the-2017-sans-threat-hunting-and-incident-response-summit-april-18th-and-19th/">Join me at the 2017 SANS Threat Hunting and Incident Response Summit – April 18th and 19th</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
