things that bother me about working in cybersecurity (in no specific order):
- glorified burn out culture
- the toxic mindset of “if you’re not spending your free time studying up on cyber, you aren’t working hard enough”
- the toxic mindset of “i had to spend 5 years working on…
Video demo of bypassing Windows Defender App Control with Loki C2! Blog with details coming in 1-2 weeks.
Yes -- @d_tranman and I created an entire C2 in JavaScript and it bypasses all the things 🥷🧙♂️🪄
We can relay back to the same machine using Kerberos relay instead of NTLM relay. I discovered this attack vector more than a year ago. I will describe it in detail in upcoming Black Hat Asia 2024 blackhat.com/asia-24/briefi… and introduce more interesting attacks.
Lotta chatter around #ScreenConnect vulnerabilities now as folks are getting spun up.
Fellow @HuntressLabs researchers and I were up all night to recreate the auth bypass and RCE exploit.
I'm not a huge fan of giving a PoC to threat actors, but I do dig snazzy video demos 😜
Is Las Vegas under cyber attack? How and why is this happening?
Massive Las Vegas cyber attack at all MGM resorts. People cannot get into their rooms with the mobile keys. Financial transactions are not working.
Imagine if that happened to a central backed digital currency in…
All ALPHV ransomware group did to compromise MGM Resorts was hop on LinkedIn, find an employee, then call the Help Desk.
A company valued at $33,900,000,000 was defeated by a 10-minute conversation.
🎉 NEW VIDEO OUT! In it, we take a look at some anti-debugging techniques and implement self-deletion in our malware! A HUGE thank you to @MalDevAcademy for sponsoring this video.
SAVE 10% OFF your order with code “CROW10” for a limited time! ❤️
youtu.be/lcJdlzKS_5o
Most folks don’t know that @kevinmitnick remained highly technical even up until the end. I worked with him on a number of pentests through the years and we always helped one another.
I’ve never seen someone so driven and persistent. Kevin loved hacking - to an obsession. He…
Ok today we are inside the perimiter
We have options:
> LDAP/ADDS (TCP 389,636,3268,3269)
> Find the printers and continue the human printer war! TCP 9100,9101
> Look for network devices (SSH, HTTP and TELNET) 22,80,443,8443,23)
> Look for services like email (SMTP TCP 25)
>…
The MOVEit Transfer exploitation is not just SQL injection(👀)
We uncovered the very last stage of the attack chain to drop human2.aspx ultimately ends up gaining remote code execution ‼
We fully recreated the attack chain with a demo achieving a reverse shell & ransomware!
The best way to learn how real threat actors operate is to read the many published threat reports on their activity
DFIR Report
thedfirreport.com
APT Groups and Operations
docs.google.com/spreadsheets/d…
ORKL
orkl.eu/sources
I’ll add more links in the replies 🧵
4K Followers 5K FollowingСлава Україні! Most important job: being Dad; I also love to help people deny attackers the opportunity to break and steal all the things. Pronouns: He/him
14K Followers 11K FollowingCybersec. & Audit VP, Global CISO, Global Head MSS, Prof. Speaker, TV appearance, Top 10 UK security personality 2010, Compliance guru, AI, Followback Security.
4K Followers 2K FollowingActs 11:26 | Cyber Security Engineer | Founder of @MaxProdT | Boxing Fan | DFIR 💪🏾 | Blue Team 💪🏾 | People lover | Views = Own
3K Followers 2K FollowingFocus on Linux/Kubernetes Attack/Detection/Forensics/Incident Response/Threat Hunting/Active Defense. Learning hard every single day.
3K Followers 33 FollowingBallisKit provides tooling and services to professional Pentesters & Red Teams.
We develop MacroPack, ShellcodePack, and DarwinOps.
#redteam #infosec
5K Followers 427 FollowingCyberSecurity researcher and founder of BallisKit. I have a passion for all infosec subjects especially redteam and writing offensive tools!
3K Followers 718 FollowingMicrosoft Certified Master (MCM): Active Directory.
Previously AD field engineer at Microsoft.
Notes from the field & the lab (@duff22b)
30K Followers 192 FollowingEmpowering businesses with proactive security solutions: Interactive Sandbox,
TI Lookup and Feeds. Sign up for free: https://t.co/8hIX0Qh5ME
2K Followers 21 FollowingSublime Security is the adaptive, AI-powered cloud email security platform that combines best-in-class effectiveness with unprecedented visibility and control.
49K Followers 339 FollowingSecurity researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]
4K Followers 2K Followingjust a french canadien | ai red team @HiddenLayerSec | CISSP BSCP CRTL CRTO OSCP eWPTX eCPPT | goofing off @ https://t.co/aWC0YYEp9x