Apr 4, 2022 | Aurora, Newsletter, Security Monitoring, Video
After almost half a year of development, we are pleased to announce the release of our free version of the Aurora Agent named Aurora Lite.
The Aurora agent is a Sigma-based endpoint agent that offers maximum transparency, flexibility, and confidentiality. It doesn’t require an additional kernel driver but uses the native Event Tracing for Windows (ETW). Other detection modules like the “Cobalt Strike Beaconing Detector” or the “LSASS Dump Detector” provide detection capabilities that exceed the scope of pure Sigma matching.
Aurora Lite is a limited but free version of the endpoint agent. It lacks some features, has no additional detection modules, and cannot be used with the comfortable ruleset and configuration management in ASGARD Management Center. The complete list of limitations can be found here.
Regardless of these limitations, we believe that even the free version can compete with other commercial endpoint agents and provides similar detection coverage.
Captured Pre-Release Web Session
The slide deck shown in the recorded web session can be found here.
Slides 8 to 18 contain a quick start guide.
The Aurora Agent online manual can be found under this link.
Product Page and Download
You can find the Aurora Agent product page and the download links here.
Nov 13, 2021 | Newsletter, Security Monitoring, Sigma, Video
The following recorded video session includes information about our new Sigma-based EDR agent called “Aurora” and the free “Aurora Lite”. It’s a preview of the agent with information on its features, limits, advantages and a live demo.
The release is scheduled for December 2021. Follow us on Twitter or subscribe to the newsletter to get updates about the development of Aurora.
The slides with the pre-release information shared in the talk, can be downloaded here.
Sep 1, 2021 | Newsletter, THOR, THOR Lite, Video
The following video shows a compromise assessment with our free THOR Lite scanner on a Microsoft Exchange 2019 server detecting ProxyShell and ProxyToken exploitation.
We’ve done no post-editing in this video. You can jump to all findings using the video chapters. You’ll see log entries, web shells and a modified IIS server configuration as reported by HuntressLabs in various reports. We added some Synth-wave tracks to create the right atmosphere. Enjoy.
By the way, we compiled a blog article regarding compromise assessments of Exchange servers with THOR Lite to detect ProxyLogon exploitation with some recommendations that still apply. You can find that blog post here.