Errata Security

@Errata

Errata Security is a consulting company comprised of cutting edge computer security researchers and developers.

Atlanta, GA
Joined June 2008

Tweets

You blocked @Errata

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @Errata

  1. Retweeted
    Aug 2
    Undo
  2. Retweeted
    Jun 26

    On the anniversary of nPetya, I masscanned the Internet for listening SMB services. I found ~1.5 million devices, split evenly between Unix/Samba and Windows. The breakdown of Windows versions was;

    Show this thread
    Undo
  3. Retweeted
    Jun 19

    Excited & honored to be one of the keynote speakers for 2018 ~ drop by & check it out if in Vegas for BH, or

    Undo
  4. Retweeted
    Jun 18

    So I just refactored the 'masscan' built-in TCP/IP stack, preparing to add Lua scripting to it. Download the latest code and play with it: git clone cd masscan; make; make test bin/masscan -p80 --banners 10.0.0.0/8 --rate 10000 or some other range

    Show this thread
    Undo
  5. Retweeted
    Jun 11

    Anyway, this is what the output looks like at this point. One thing I've learned is that Samba machines often configure the 16-byte server GUID (which should be randomly generated and unique) as the ASCII name of the of machine, so I'm going to have to change the parser for that

    Show this thread
    Undo
  6. Retweeted
    Jun 11

    Apparently one of the consequences of exposing port 445 to the Internet is that you get so thoroughly hacked that your machine will run out of memory and not be able to respond to future hacks.

    Show this thread
    Undo
  7. Retweeted
    Jun 11

    So I've added banner checking for NetBIOS/SMB (tcp 139/445) in masscan, to grab OS version information. I'm trying to debug it on Internet facing hosts, but it's a mess out there, such as this error message from one of the machines.

    Show this thread
    Undo
  8. Retweeted
    Apr 5

    Don’t let this get lost in the noise. If you pay attention to one warning about things to mitigate this year... pay attention to this one.

    Undo
  9. Retweeted
    Mar 14
    Undo
  10. Retweeted
    Mar 12

    OpSec. OpSec. OpSec.

    Undo
  11. Retweeted
    Feb 28

    I debunk a Tor-hating journalist's "proof" that Tor privately tips off vuln information to the government:

    Show this thread
    Undo
  12. Retweeted
    Feb 20

    One of things most proud about in case I worked on with && is that our research is helping to shape laws around crypto security and prosecution in the Ukraine 💪

    Undo
  13. Retweeted
    Jan 14

    This week’s rifle match: realizing how much I hate obstacles (but loving my new pants).

    Undo
  14. Retweeted
    10 Oct 2017

    I dub CVE-2017-11779 MiniDIsc. A MiniDisk is more advanced than a record for no good reason and has lots of problems.

    Undo
  15. Retweeted
    21 Jul 2017

    Ladies and gentlemen please consider following Mr. Adam Flatley he is newest scret weapon in hunting.

    Undo
  16. Retweeted
    5 Jul 2017

    Stop reading internet armchair commandos thoughts on what happened in Ukraine and check this out:

    Undo
  17. Retweeted
    26 Jun 2017

    Its good to see another two projects I've worked on at Cisco make the CEO keynote today.

    Undo
  18. Retweeted

    Player 3 Has Entered the Game: Say Hello to 'WannaCry'

    Undo
  19. Retweeted
    11 May 2017

    So I finally got around to writing up comments on Trump's cybersecurity executive order.

    Undo
  20. Retweeted
    25 Apr 2017

    Jeff Goldblum will be back in the next Jurassic sequel

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·