The Haag™

@M_haggis

I help companies eradicate evil. I'm Everywhere and Nowhere

127.0.0.1
Vrijeme pridruživanja: ožujak 2007.

Tweetovi

Blokirali ste korisnika/cu @M_haggis

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @M_haggis

  1. Prikvačeni tweet
    25. lip 2019.

    For $10 on , you can setup a Ubuntu instance with and v2 dataset. Here's how:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    28. sij

    Chain Reactor makes simulation of adversary behaviors and techniques on Linux fast, easy, free. Great work by Carl, , and the team!

    Poništi
  3. proslijedio/la je Tweet
    22. sij

    The Attack Range solves two main challenges in development of detections: - quickly build a small pre configured lab infrastructure as close as possible to your production environment - perform attack simulation using Atomic Red Team

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    22. sij

    BREAKING - To help organizations identify compromised systems with CVE-2019-19781, & have released a tool that searches for indicators of compromise associated with attacker activity observed by

    Prikaži ovu nit
    Poništi
  5. 17. sij

    I hope teams still find this useful. A lot of default macro templates from frameworks produce similar behaviors. Happy testing!

    Prikaži ovu nit
    Poništi
  6. 17. sij

    Security teams can now generate macros in Atomic Red Team to test their ability to observe and detect emerging initial access techniques.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    13. sij

    In this post, dissects Mimikat'z kernel mode driver, Mimidrv, and walks through some of the capabilities available to us in ring 0. Check it out:

    Poništi
  8. proslijedio/la je Tweet
    19. stu 2019.

    If you’re into writing or detecting maldocs and you haven’t looked at ViperMonkey, look now: I’m told it’s now used by Project Zero and DoD. One of the primary authors is a associate and a good person to follow:

    Poništi
  9. proslijedio/la je Tweet
    14. stu 2019.

    is officially in the (digital) books now, with the content (videos, blogs, slides) are now available online. Thanks from and I and conference organizers to speakers and participants for another great year!

    Poništi
  10. proslijedio/la je Tweet
    12. stu 2019.

    used to limit users to a Python execution framework on macOS and Linux, and that has now changed. Thanks to some wonderful folks at Walmart Infosec the Invoke-AtomicRedTeam PowerShell framework is now platform independent!

    Poništi
  11. 11. stu 2019.
    Poništi
  12. 11. stu 2019.

    Apparently It's been a while since I have added much to this - What am I missing?

    Poništi
  13. 29. lis 2019.

    Making Meterpreter Look Google-Signed (Using MSI & JAR Files) by

    Poništi
  14. proslijedio/la je Tweet
    28. lis 2019.

    I've added the slides for my C# Workshop at here: If you have questions, let me know!

    Poništi
  15. proslijedio/la je Tweet
    27. lis 2019.

    “Thinking up new ways to use the information in front of me is kind of like playing a game all day.” 💻⚙️🔒 Meet Carrie, the engineer whose job is hacking and protecting Walmart’s network:

    Poništi
  16. proslijedio/la je Tweet
    25. lis 2019.

    It has been a pretty amazing week, met some amazing people , delivered 2 talks with , and our team opensource 4 projects, one of which I am most proud of and significant is our analytics stories (62 use cases, 167 detections) 🔥 😎

    Poništi
  17. proslijedio/la je Tweet
    24. lis 2019.

    Going to have some fun at next week talking about analytics you can turn into alerts for Linux. Here's an example of one from the session.

    Poništi
  18. proslijedio/la je Tweet
    23. lis 2019.

    Posted a diary / blog about Behavior-based threat hunting today: This includes a lot of shout-outs, esp. to at - which I've highlighted! thanks also (lua)

    Poništi
  19. proslijedio/la je Tweet
    23. lis 2019.

    Hunting with Windows Security EventID 5145 summarized in one mindmap 4648, 4624 are next

    Prikaži ovu nit
    Poništi
  20. 24. lis 2019.
    Poništi
  21. 17. lis 2019.

    Hey that's me! Hope everyone can come hang out! BOTS is going to be awesome this year!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·