This week, it's SANSFIRE[1]! I'm attending the FOR577[2] training ("Linux Incident Response & Threat Hunting"). On day 2, we covered the different filesystems and how data is organized on disk. In the Linux ecosystem, most filesystems (ext3, ext4, xfs, …) support "extended file attributes", also called "xattr". It's a file system feature that enables users to add metadata to files. These data is not directly made available to the user and may contain anything related to the file (ex: the author's name, a brief description, …). You may roughly compare this feature to the Alternate Data Stream (ADS) available in the Windows NTFS filesystem.
More Free File Sharing Services Abuse, (Wed, Jul 16th)
A few months ago, I wrote a diary about online services used to exfiltrate data[1]. In this diary, I mentioned some well-known services. One of them was catbox.moe[2]. Recently, I found a sample that was trying to download some payload from this website. I performed a quick research and collected more samples!
Keylogger Data Stored in an ADS, (Tue, Jul 15th)
If many malware samples try to be "filess" (read: they try to reduce their filesystem footprint to the bare minimum), another technique remains interesting: Alternate Data Streams or "ADS"[1]. This NTFS feature allows files to contain multiple data streams, enabling hidden or additional metadata to be stored alongside the main file content without being visible in standard file listings. A common usage of ADS is the "Mark of the Web"[2] that helps to flag files as suspicious or not depending on their origin.
DShield Honeypot Log Volume Increase, (Mon, Jul 14th)
The volume of honeypot logs changes over time. Very rarely are honeypot logs quiet, meaning that there are no internet scans or malicious activity generating logs. Honeypots can see large increases in activity [1], but this has tended to be the exception, rather than the rule. Within the last few months, however, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from my residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that I run and archive logs from frequently.
Setting up Your Own Certificate Authority for Development: Why and How., (Wed, Jul 9th)
There are several reasons why one would set up an internal certificate authority. Some are configured to support strong authentication schemes, some for additional flexibility and convenience. I am going to cover the second part. In particular, it can be helpful for developers to have an internal certificate authority to issue certificates for development purposes. Websites used for development and internal testing are usually only used by a few individuals and are generally only accessible via internal networks or VPNs. Often, these sites do not even use TLS. But there are a few reasons why you should consider running TLS on all sites, including internal development sites:
Microsoft Patch Tuesday, July 2025, (Tue, Jul 8th)
Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been exploited.
What's My (File)Name?, (Mon, Jul 7th)
Modern malware implements a lot of anti-debugging and anti-analysis features. Today, when a malware is spread in the wild, there are chances that it will be automatically sent into a automatic analysis pipe, and a sandbox. To analyze a sample in a sandbox, it must be "copied" into the sandbox and executed. This can happen manually or automatically. When people start the analysis of a suspicious file, they usually call it "sample.exe", "malware.exe" or "suspicious.exe". It's not always a good idea because it's can be detected by the malware and make it aware that "I'm being analyzed".
Quick Password Brute Forcing Evolution Statistics, (Tue, Jun 24th)
We have collected SSH and telnet honeypot data in various forms for about 10 years. Yesterday's diaries, and looking at some new usernames attempted earlier today, made me wonder if botnets just add new usernames or remove old ones from their lists. So I pulled some data from our database to test this hypothesis. I didn't spend a lot of time on this, and this could use a more detailed analysis. But here is a preliminary result:
Scans for Ichano AtHome IP Cameras, (Mon, Jun 23rd)
Ichano's "AtHome Camera" is a bit of a different approach to home surveillance cameras [1]. Instead of a hardware camera solution, this product is a software solution that turns existing devices like computers and tablets into webcams. The software implements features we know from similar IP camera devices. It enabled streaming of images and remote access to features like motion detection and alerting.
Announcing Microsoft Desired State Configuration v3.1.0
We’re pleased to announce the General Availability of Microsoft’s Desired State Configuration (DSC)
version 3.1.0. This release marks a significant milestone in our effort to deliver cloud-native
configuration management for cross-platform environments. DSC is a declarative configuration and
orchestration platform that defines a standard way of exposing settings for applications and
services. DSC v3.1.0 is built on collaboration with key improvements driven by partner requests.
Special thanks to the Windows Package Manager (WinGet) team and the incredible support of the DSC
community.
For additional details about the initial DSC v3.0.0 release, see:
- DSC v3.0.0 Announcement
- DSC v3.0.0 Get Started
- DSC v3.0.0 Enhanced Authoring
What’s New in DSC v3.1
This release continues our momentum by delivering features and improvements
driven by real world use, partner feedback, and community contributions.
DSC v3.1 includes updates and fixes across the platform. Here are some of the
most important improvements:
WinGet and partner-driven enhancements
- Core infrastructure updates to enable DSC-based management in WinGet scenarios.
- Extended resource invocation APIs, allowing for richer integration by external tools.
- Increased flexibility for configuration refresh and reporting, driven by partner needs.
Resource authoring improvements
- Improved handling and validation for resource schema files, with clearer error messages.
- Fixed issues with module loading and path resolution that impacted PSDSC resources.
- More robust handling of resources with required and optional properties.
Cross-Platform reliability and bug fixes
- Fixed several Linux-specific issues in resource execution, state detection, and error
reporting. - Improved Windows compatibility, particularly for recent versions and in mixed-OS
environments. - Addressed inconsistencies in the application of ensure properties and desired state
evaluation.
Performance and quality
- Optimized configuration drift detection, resulting in faster and more reliable test
operations. - Reduced occurrence of configuration runs left in an indeterminate or failed state.
- Improved error handling for edge cases in
set,test, andgetoperations.
Diagnostics and usability
- Expanded logging and diagnostics, making it easier to trace resource behavior and
configuration activity. - Improved the clarity and usefulness of error and warning messages across platforms.
- More consistent reporting of operation outcomes in both interactive and automated
scenarios.
For a full list of changes, see the DSC v3.1 changelog
Installing DSC
To get started, follow these steps to install DSC on your system:
On Windows, you can install DSC from the Microsoft Store using winget. By installing from the
Store or using winget, you get automatic updates for DSC.
Search for the latest version of DSC:
winget search DesiredStateConfiguration --source msstore
Name Id Version Source
---------------------------------------------------------------
DesiredStateConfiguration 9NVTPZWRC6KQ Unknown msstore
DesiredStateConfiguration-Preview 9PCX3HX4HZ0Z Unknown msstore
Install DSC using the id parameter:
# Install latest stable
winget install --id 9NVTPZWRC6KQ --source msstore
# Install latest preview
winget install --id 9PCX3HX4HZ0Z --source msstore
On Linux and macOS, you can install DSC using the following steps:
- Download the latest release from the PowerShell/DSC repository.
- Expand the release archive.
- Add the folder containing the expanded archive contents to your
PATHenvironment variable.
Support lifecycle
DSC follows semantic versioning.
The first release of DSC version 3.0.0 is a Stable release. DSC version 3.1.0 is the current Stable
release. Patch releases update the third digit of the semantic version number. For example, 3.1.1 is
a patch update to 3.1.0. Stable releases receive patches for critical bugs and security
vulnerabilities for three months after the next Stable release. For example, version 3.1.0 is
supported for three months after 3.2.0 is released.
Always update to the latest patch version of the release you’re using.
Call to action
For more information about Desired State Configuration v3.0 (DSC), see the DSC documentation.
We value your feedback. Stop by our GitHub repository and let us know of any issues you find.
Jason Helmick
Sr. Product Manager, PowerShell
The post Announcing Microsoft Desired State Configuration v3.1.0 appeared first on PowerShell Team.