Rohan Vazarkar

@CptJesus

Penetration Tester and BloodHound Developer

Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @CptJesus

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @CptJesus

  1. Prikvačeni tweet
    12. ožu 2019.

    Today, we're releasing BloodHound 2.1, with a giant heap of bug fixes, as well as new edges to abuse the awesome resource based constrained delegation attack. Find more details at and get the release at

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    In his post, "Detection Engineering using Apple’s Endpoint Security Framework," illustrates how you can use ESF to detect In-Memory Execution on endpoints. Check it out:

    Poništi
  4. 29. sij

    To clarify further, if you scroll to the bottom of node panels, there's a place to attach pictures to the nodes.

    Prikaži ovu nit
    Poništi
  5. 29. sij

    Do you use/find useful the node pictures function in BloodHound?

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    22. sij

    This is one of the most exciting bits of research and tooling produced at SpecterOps in recent memory.

    Poništi
  7. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  8. proslijedio/la je Tweet
    24. sij

    : - Steven’s recent COM/RDP research perfectly demonstrates his problem-solving ability, operational vision, and technical expertise.

    Poništi
  9. proslijedio/la je Tweet
    22. sij

    Despite its incredible security enhancements, PowerShell continues to be abused by adversaries. A strong knowledge of PowerShell enables defenders to effectively manage and respond to its abuse. (1/4)

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    21. lis 2019.

    to convert epoch timestamps for data: MATCH (n:User) WHERE n.enabled = TRUE RETURN , datetime({epochSeconds: toInteger(n.pwdlastset) }), datetime({epochSeconds: toInteger(n.lastlogon) }) order by n.pwdlastset

    Poništi
  11. proslijedio/la je Tweet
    12. pro 2019.

    The video for my, and ’s talk from 2019 is now available to watch here:

    Poništi
  12. proslijedio/la je Tweet
    8. pro 2019.

    Blueteam members need to find and patch or monitor attack paths environments. Sylvain Heiniger explains how to easily spot issues using . Thanks to , , and for the awesome tool.

    Poništi
  13. proslijedio/la je Tweet
    20. stu 2019.

    Introducing the Funnel of Fidelity, a model to evaluate the efficacy of detection and response programs.

    Poništi
  14. proslijedio/la je Tweet
    18. stu 2019.

    Either you are an attacker or defender, detecting privilege relationships in AD connected data is easy to do w/ BloodHound! What about notebooks to complement the data analysis and viz 📊 of graph data? cc: 🍻

    Poništi
  15. proslijedio/la je Tweet
    19. stu 2019.

    I’m presenting at the ISACA infosecurity conference this week on understanding the threat perspective. I look forward to meeting a lot of great people!

    Poništi
  16. proslijedio/la je Tweet
    14. stu 2019.

    "When Kirbi walks the Bifrost" In this post, talks about Active Directory attacks leveraging a MacOS AD joined endpoint. Check it out:

    Poništi
  17. proslijedio/la je Tweet
    14. stu 2019.

    Stealing Tickets from MacOS: How Kirby traverses Heimdal's Bifrost to cross from Darwin to Windows Kerberos Authentication. Blog: Tool:

    Poništi
  18. proslijedio/la je Tweet
    28. lis 2019.

    Did you know: Principals with control of disabled users can re-enable those users. No DA rights or other special rights required. If your attack path includes disabled users, it is STILL valid! In this example, Andrew.Chiles has full control of Chris.Maddalena:

    Poništi
  19. proslijedio/la je Tweet
    30. lis 2019.

    Looking for a certain topic in the Gang Slack? Pro tip: click "Channels" at the top of the channel list, then sort the channels by number of members to find the most active channels. Not in the BloodHound Gang Slack? Get your invite here:

    Poništi
  20. proslijedio/la je Tweet
    11. kol 2019.
    Poništi
  21. proslijedio/la je Tweet
    28. lis 2019.

    Today I’m kicking off a 4-part series on wireless tradecraft following the past few months of R&D. Pt 1 provides a primer on 802.11 with a focus on features that can be abused by attackers. Post: Tool:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·