Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ItaiGrady
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ItaiGrady
-
Itai Grady proslijedio/la je Tweet
Going to be demoing the new SILENTTRINITY update at the Defcon Demo Labs from 1400 to 15:50 tomorrow ! If you’re interested in somewhat weird .Net tradecraft this might peek your interest :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
I wonder if when
#Microsoft fixed our#NTLM vulnerabilities they broke macOS connecting to file shares. Wanna figure out why? Drop by the talk@simakov_marina and I will deliver@defcon talk in just 1.5 hours (Track 4, Paris Theatre)https://twitter.com/NerdPyle/status/1159874698181611520 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
If you missed our
#BHUSA talk yesterday, no worries.@YaronZi and I will be presenting our research + some new additions at#DEFCON tomorrow at 3pm. This is your last chance...
pic.twitter.com/L4SFRfhpsT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
Happy to announce that XM super team will be presenting at
#DEFCON. See you there!pic.twitter.com/pCLKlxzEIM
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
What is one of the most impactful defensive steps you can take as a defender? Enable MFA.
Need data on why?
By @Alex_T_Weinert https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Your-Pa-word-doesn-t-matter/ba-p/731984 …
Use #AzureSentinel to see attacks: https://twitter.com/JohnLaTwC/status/1125810589370961920 …
Secure it: https://docs.microsoft.com/en-us/azure/security/azure-ad-secure-steps …
cc/ @Alex_A_Simonspic.twitter.com/rikq3NDnhg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
If you use O365, you need to learn about password spray. Want to see some campaigns against you? Try
#AzureSentinel--you can connect your O365 data for free. Here are some common patterns.

Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
If you are interested in seeing a kill chain/technique matrix built out for O365 attacks, give this tweet a like and let me know!pic.twitter.com/6pas4RwHjk
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
Jupyter Notebooks are a powerful tool for security analysts and hunters (don't let scientists have all the fun!). Part of a project (inspired by
@JohnLaTwC) to use Jupyter with#AzureSentinel http://bit.ly/2V3nMzE .#Jupyter#AzureNotebooks#MSTICpic.twitter.com/ctLnaVCGJC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
There was a lot of talk this year about encouraging people to present their work in
#infosec and making our field more approachable. If this describes your 2018 experience, may 2019 be the bottoms up version!pic.twitter.com/zj5Gj0fyLS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
At
#ATTACKcon I talked about#Jupyter notebooks as a way to share repeatable analysis. I was asked to share mine. Promise kept! Learn how a notebook can speed hunting and automation with the new WDATP APIs.
https://techcommunity.microsoft.com/t5/Threat-Intelligence/Automating-Security-Operations-Using-Windows-Defender-ATP-APIs/m-p/294434 …
https://github.com/Microsoft/WindowsDefenderATP-Hunting-Queries/blob/master/Notebooks/WDATP%20APIs%20Demo%20Notebook.ipynb …
h/t @killchainpic.twitter.com/LqnOBLpKPR
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
I updated
#mimikatz to support Windows 1809, even the kernel driver! (with my expired certificate
)
Of course, misc::memssp to bypass Credential Guard chain included
(but also, crypto, event log, terminal server...and passwords in clear when enabled!)
> https://github.com/gentilkiwi/mimikatz/releases …pic.twitter.com/77kp2BLihsPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
Active Directory forests are no longer a security boundary thanks to
@tifkin_'s printer bug. Check out https://posts.specterops.io/not-a-security-boundary-breaking-forest-trusts-cd125829518d … for weaponization and mitigation details and@Cyb3rWard0g's post for detection guidancehttps://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ruling the rules in
#MCAS! Fantastic detection by@talthemaor and@IgalGofmanhttps://twitter.com/talthemaor/status/1063130662864150528 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Trolling friends with Google Home?https://twitter.com/binitamshah/status/1057583517083885568 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
Published some screen shots of the DcShadow detectionhttps://techcommunity.microsoft.com/t5/Enterprise-Mobility-Security/How-Azure-Advanced-Threat-Protection-detects-the-DCShadow-attack/ba-p/265740 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
1/4
#shadowbrokers leaked NSA#DarkPulsar admin console, but not the implant itself. Researchers@kaspersky were able to find its implant counterpart by looking for encryption constants. https://securelist.com/darkpulsar/88199/ … via@Securelistpic.twitter.com/s92z9kSwEr
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
That moment when you're looking at a VBScript wondering whether it's just a really thorough IT inventory script or a recon tool. Then you see the reference to
#mimikatz.
https://www.virustotal.com/#/file/fd334bb96b496592db6c9771f305a2ddca6610a59c6d45f5bbbb2b38859b4f36/detection …
https://gist.github.com/JohnLaTwC/08011be514084fb7a8ccac9ed948a0ec …pic.twitter.com/43wRsabP07
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
Interested in articles about the Windows Kernel? Check out this new series by the
@Windows team. You'll find out that, indeed, taskmgr can scale to show a machine with 896 cores, 1792 logical processors, and 2TB of RAM!
https://techcommunity.microsoft.com/t5/Windows-Kernel-Internals/One-Windows-Kernel/ba-p/267142 …
Follow @mamyun for updates!pic.twitter.com/gKv8uQiuBD
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
You just need to be rude and get access
#libSSHhttps://twitter.com/TalBeerySec/status/1052817079202705408 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Itai Grady proslijedio/la je Tweet
holy balls. this is incredible the vulnerability literally works like this: me: "can i log in?" server: "no. you need a password." me: "hacker voice i'm in" server: "login successful. you're in"https://twitter.com/svblxyz/status/1052241153737678849 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.