Steve

@Steve_rt1

All things - - - alumni

Views are my own.
Vrijeme pridruživanja: siječanj 2013.
Rođen/a 01. srpnja

Tweetovi

Blokirali ste korisnika/cu @Steve_rt1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Steve_rt1

  1. Prikvačeni tweet
    13. lip 2017.

    should not ask companies to put in their products or

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    w00t the paper I wrote to accompany my presentation is now available! Find it here (and note the "Skip" button below the contact form to get right to the paper):

    Poništi
  3. proslijedio/la je Tweet
    3. velj
    Poništi
  4. proslijedio/la je Tweet
    3. velj

    Have you looked at the Notebook features in but wanted to know more? Check out this deep dive of our Host Explorer Notebook to understand what it is doing and how to use it:

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    My Sysmon config sees the shell/open reg key being written, if you want to alert on this. /cc

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    2. velj

    Uses a New Windows 10 UAC Bypass to Launch Quietly

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    A curated list of resources for learning about deploying, managing and hunting with Microsoft Sysmon. Contains presentations, deployment methods, configuration file examples, blogs and additional github repositories.

    Poništi
  8. proslijedio/la je Tweet
    3. velj

    Python Script to access ATT&CK content available in STIX via a public TAXII server

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  10. proslijedio/la je Tweet
    26. sij

    Dropping Anchor: From a TrickBot Infection to the Discovery of the Anchor Malware -

    Poništi
  11. proslijedio/la je Tweet
    26. sij
    Poništi
  12. proslijedio/la je Tweet
    26. sij
    Poništi
  13. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  14. proslijedio/la je Tweet
    26. sij

    and use Windows scheduled tasks to persist and move. When responding: 1. When was the task created? 2. Which account created it? 3. What does the task do? 4. Where did attacker come *from* to auth and create the task? Establish new leads and pursue them.

    Poništi
  15. proslijedio/la je Tweet
    3. lis 2019.
    Poništi
  16. proslijedio/la je Tweet

    In partnership with , is hosting a webinar on Microsoft Defender ATP’s advanced capabilities for endpoint security on January 29, 2020 at 10:30 AM EST. Register here:

    Poništi
  17. proslijedio/la je Tweet
    24. sij
    Poništi
  18. 25. sij

    Here Is the Technical Report Suggesting Saudi Arabia’s Prince Hacked Jeff Bezos’ Phone

    Poništi
  19. proslijedio/la je Tweet
    24. sij

    NEW: Hackers target unpatched Citrix servers to deploy ransomware * REvil gang attacks confirmed * Maze also suspected * Other groups are selling access to hacked Citrix systems on hacking forums

    Poništi
  20. proslijedio/la je Tweet
    24. sij

    We've worked on a blog post that explains how to integrate into Microsoft Defender ATP and extend its Live Forensics capabilities

    Poništi
  21. proslijedio/la je Tweet
    24. sij

    Most active APT groups against Europe according to

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·