@Decode141 and I will be sharing ideas for engaging in cyber deception in Active Directory at BlackHat USA next Thursday between 11:25 and 12:35 PST in the Business Hall - Arsenal Station 5.
If you are around, please visit us in-person or virtually using a free on-demand…
1️⃣ Get all major Win32 apps running in a sandbox
2️⃣ Remove the friction caused by apps or system components with unneeded or excessive privs
3️⃣ enable adminless by default on Windows
1) We are finally propagating MotW to Virtual Disk containers! For example, when you download and mount an ISO from the Internet, applications that query the zone of files inside of that ISO will receive the zone of the ISO itself. 3/7
Microsoft fixed my Kerberos PAC verification bypass issue this month in HTTP.sys which me and Nick presented at Blackhat. Sadly no more details for 30 days, but it might be easy to work out how to do it :) msrc.microsoft.com/update-guide/v…
Google completed its acquisition of Mandiant today. We’re excited to get started on our shared mission to create a comprehensive and best-in-class cyber security solution for customers and partners. Read more here: mandiant.com/company/press-…
44CON 2022 Talk announce : @sadreck "Codecepticon – Building an obfuscator to bypass Modern EDR and AV" here's a hint "no, this one isn’t a python script that runs “replace” a bunch of times." 44con.com/get-ticket#44CON
Excited to announce that I will be leading an on-demand session at #BlackhatUSA that’ll cover core #GraphQL concepts and how to exploit the most common #security issues. Join the session virtually from Aug 10. blackhat.com/us-22/#BHUSA
Excited to announce "Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling" is coming to @defcon! Can't wait to share it! Check out the abstract here #DEFCON30portswigger.net/research/talks…
Thrilled to share my new blog post: Put an io_uring on it: Exploiting the Linux kernel. Follow me while I learn a new kernel subsystem + its attack surface, find an 0day, build an exploit, + come up with some new tricks. I go deep and demystify the process
graplsecurity.com/post/iou-ring-…
We are excited to announce that we've signed an agreement to join the @googlecloud family — bringing together some of the best minds in security! Read more here: mandiant.com/company/press-…
@tifkin_ and I are giving our talk "ReCertifying Active Directory Certificate Services" today at 3:20PM in Room BC at #BlackHatEurope . If you're interested in securing your AD CS deployment, come check it out!
I almost feel sorry for attackers with this... almost 😈 Amazing work from the @ThinkstCanary team! If you are not using Canarytokens in your live environment, you are missing out on easy early indicators of compromise.
I almost feel sorry for attackers with this... almost 😈 Amazing work from the @ThinkstCanary team! If you are not using Canarytokens in your live environment, you are missing out on easy early indicators of compromise.
2K Followers 5K FollowingPentester Descubriendo lo que se puede hacer. Conquense de nacimiento,Valenciano de adopcion, Madrileño por trabajo, ciudadano del mundo. Polimata⠠⠵
189 Followers 797 FollowingCyber security enthusiast, bug bounty hunter, I spend time reading what NASA is up to in space research too. But dont expect any tweet about Mars exploration
276 Followers 414 FollowingIndependent security researcher. Exploit code not people... and fan of the tiny @shirleysetia love u to the moon and back tiny.
141K Followers 27 FollowingThe assumed Official Twitter account of the world's most mysterious & secret (and fictitious) military base.
(Parody/Satire Account)
39K Followers 1K FollowingHead of Research and Discovery (RAD) @Google Threat Intelligence Group via @Mandiant acquisition. Posts are attributable to me—not my employer.
Former @USMC.
2K Followers 177 FollowingSecurity Researcher. Usenix 2017 ,MSRC top 100 2016/2017/2018.
All the tweets are totally my personal opinions, not about any of my current employer stuff.
83K Followers 16 FollowingTrend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
7K Followers 870 FollowingHead of Red team @ IBM X-Force. Black Hat Review Board. Founder and co-organizer of Offensive AI Con. Co-Founder of RemoteThreat. inveni et usurpa
16K Followers 2K FollowingWindows and Authentication at Microsoft. Developer. Mostly dog pictures. Might actually be two dogs in a trench coat. 🇺🇸 / 🇨🇦 @syfuhs.net on blue sky
20K Followers 439 FollowingHacker, Infosec Researcher, Military Affairs & History, PowerShell, AD and Azure pwner, Creator of Nishang and others :)
Founder @alteredsecurity
165 Followers 519 FollowingSales Director, husband, dad, son, uncle, petrolhead and cyclist. Travelled more miles on my bikes than in my cars combined last year. loser. Views are mine.