Steven

@0xthirteen

Working to become smarter everyday. Adversary Simulation . Coffee Brew Teamer

Vrijeme pridruživanja: prosinac 2011.

Tweetovi

Blokirali ste korisnika/cu @0xthirteen

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xthirteen

  1. proslijedio/la je Tweet
    4. velj

    As promised, here is the follow up defensive blog to last weeks post on Attacking Azure.

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    In his post, "Detection Engineering using Apple’s Endpoint Security Framework," illustrates how you can use ESF to detect In-Memory Execution on endpoints. Check it out:

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    For the past few months, I've been diving into Apple's Endpoint Security Framework. This post shares how I use the framework for detection engineering purposes.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    29. sij

    We have just pushed some *big* updates to Ghostwriter's master branch that I think you'll like. We've got WYSIWIG editors, autocomplete, new reports, and more! Check it out:

    Poništi
  7. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  8. 27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  9. 22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  10. proslijedio/la je Tweet
    21. sij

    We released a Red Teaming book! Red Team Development and Operations. It's been a crazy project that has existed in many forms. It started as simple notes, came together as a SANS class, and will now live as a book. Read about it here.

    Poništi
  11. proslijedio/la je Tweet
    21. sij

    Just released Satellite, a payload hosting and proxy software for red team operations. In the blog post, I discuss the feature set of Satellite as well as why an operator would choose it over Apache or Nginx.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    6. sij

    New year, new on the information security team. Why Palantir? Our software has been used to stop terrorist attacks, develop new medicines, improve national defense, combat child trafficking, etc. InfoSec is germane to our existence. 1/n

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    3. sij

    The offensive security community means a lot to me. Following 's great thread that injected some much needed infosec positivity, I wanted to highlight a few (offensive-ish) posts/talks that my team and myself enjoyed over the last year or so.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    27. pro 2019.

    SharpSploit v1.5 is out! Includes amazing work from , , , , and . Includes: lateral movement over SCM and PSRemoting, an AMSI bypass, CreateProcessWithToken, and DynamicInvoke improvements. 🔥🔥🔥

    Poništi
  16. proslijedio/la je Tweet
    17. pro 2019.

    New blog post outlining how to use my .NET RPC Client tooling from PowerShell and C# to test and exploit local RPC security vulnerabilities. Also an early xmas present for those who enjoy long standing design flaws in UAC :-)

    Poništi
  17. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    4. pro 2019.

    The second part of my series of posts on FreeIPA is out. This post covers basic enumeration techniques inside of a FreeIPA environment.

    Poništi
  19. proslijedio/la je Tweet
    25. stu 2019.

    Today I was able to release the first post of a series of blog posts about attacking FreeIPA, an open source alternative to Windows Active Directory inside of unix environments. This post covers authentication, and situational awareness.

    Poništi
  20. proslijedio/la je Tweet
    21. stu 2019.

    We are hosting a training event in Alexandria, VA. on January 27th - 30th. Both the Red Team Operations and Detection courses will be offered. Sign up here: Red Team Operations: Detection:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·