Patrick O

@650LemonZest

Fiasco Cyber ... Nerds!

Miami, FL
Vrijeme pridruživanja: studeni 2019.

Tweetovi

Blokirali ste korisnika/cu @650LemonZest

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @650LemonZest

  1. proslijedio/la je Tweet
    prije 5 sati
    Odgovor korisniku/ci
    Poništi
  2. proslijedio/la je Tweet
    prije 13 sati

    Is 2020 the year 1-byte XOR crypters no longer work? ... No. (In fairness I expect this to be less uniform a bypass than it used to be.)

    Poništi
  3. proslijedio/la je Tweet

    My Sunday so far - Went for a 4 mile walk (still healing), had a fabulous nap, now parsing APFS structures for a future lab while drinking Truly. Living my best life, really. 🤣

    Poništi
  4. 26. sij

    ✌️RIP KOBE

    Poništi
  5. proslijedio/la je Tweet
    23. sij

    This is a great illustration of adherence to policy "NO MATTER WHAT." I hope this is a spoof, but for those confused, he's clearing his weapon before entering an area by attempting to discharge it into a barrel filled with sand. Except here, it will kill both of them...

    Poništi
  6. proslijedio/la je Tweet
    21. sij

    "The company found that the five most common malware infections it helped its clients with last year — Trickbot, Emotet, Ryuk, Dridex and BitPaymer —" As you know, intrusions involving these families also predominately involve EMPIRE and Cobalt Strike.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    Hardware hacking peeps, lovers, enthusiasts and everyone else: Would you find a web app, that lists dev boards, chips, components etc and how best to hack them, extract/tinker with tips and tricks updated via a git repo (community driven as well as by a core group) useful?

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    14. sij

    Love this, apropos of the Microsoft vulnerability much discussed today.

    Poništi
  9. proslijedio/la je Tweet

    These deep fakes are bloody life-like. Damn that's some impressive tech right there.

    Poništi
  10. proslijedio/la je Tweet
    15. sij

    Language capability can make or break your operations. Added benefit if they're native to the target environment, as they will understand local and regional linguistic and cultural nuance. Finding someone you can both trust with the operation and has all the above is challenging.

    Poništi
  11. proslijedio/la je Tweet
    6. lis 2019.

    This book is under 200 pages of easy to consume material, but in my opinion it is one of the most important books for any information security professional to read. I've recommended it for years now, but plenty of you have not read it. Pick it up today.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    14. sij

    I still have followers who have not read this book. This isn't going to rehash the same material you're used to, it isn't very technical, and it provides an overview of a state computer network operations (CNO) program. It is a must read.

    Poništi
  13. proslijedio/la je Tweet

    Windows 7: “I’m not dead yet!”

    Poništi
  14. proslijedio/la je Tweet
    14. sij

    Ding Xiaoyang (丁晓阳) is behind adverts for Hainan Xiandun, an APT cover company in Hainan, China. He uses the alias 'Mr Chen'

    Poništi
  15. proslijedio/la je Tweet

    So I have some news. After 14 amazing years at Penn, I'm moving to a unique new gig at Georgetown. Starting this semester, I'll be the McDevitt Chair of Computer Science and Law, where I'll focus on interdisciplinary research and teaching that bridges CS and law/public policy.

    Prikaži ovu nit
    Poništi
  16. 7. sij
    Tweet je nedostupan.
    Poništi
  17. proslijedio/la je Tweet
    6. sij

    Los Diablos 1 sneezed whilst watching on my macbook. Unfortunately with aloe vera juice in his mouth, which promptly went onto the keyboard. Queue "oh no", me getting flustered whilst trying to limit damage and now with the worlds stickiest keyboard. kids.

    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. proslijedio/la je Tweet
    6. sij

    Positive move. Now can we also invalidate mobile sessions when 2fa is turned on so they too have it?

    Poništi
  20. proslijedio/la je Tweet
    5. sij

    In light of the conversation on both Iran and Offensive Security Tools, now's a great time to mix those together and remind you that APT33, APT34, APT35, and APT39 have used Offensive Security Tools developed by the security community extensively in their intrusion operations.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·