Samuel

@Valcan_K

Samuel - Red/Purple Teamer | Pentester | GXPN | GWAPT | GPEN | etc.. (opinions are my own) I Like To Hack Things @

Vrijeme pridruživanja: lipanj 2018.

Tweetovi

Blokirali ste korisnika/cu @Valcan_K

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Valcan_K

  1. Prikvačeni tweet
    15. lis 2019.

    A Red Teamer's Review of 's OpenSOC CTF. Recently I had the opportunity to participate in this CTF with some great teammates (, , , ) Check out the write up: ,

    Poništi
  2. 3. velj

    Planning on diving more into Reverse Engineering this year. Really want to make it past the 4th challenge in the CTF by . Maybe if I'm lucky I'll be able to complete them all. 🤞🤞🤞🤞🤞🤞🤞

    Poništi
  3. 3. velj

    The only good thing about sports ball!

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  5. 30. sij

    When your friends tell you they'll get you a coffee...but they don't.

    Poništi
  6. 29. sij

    Thinking of doing some development on automating various Adversarial TTPs for better detection testing. Which platform do you all prefer? 's Atomic Red Team or 's Caldera?

    Poništi
  7. 28. sij

    bitsadmin doesn't like it when you try to download files from a Python SimpleServer. Good thing you can set up an Apache web server with a few commands.

    Poništi
  8. 24. sij
    Poništi
  9. 24. sij

    I've almost completed my 3 year goals... in 2.5 years. Only 2 more things on the list! Looks like it's time to update/redo my short term goals!

    Poništi
  10. 14. sij

    Study for CISSP or work on a few CFPs?

    Poništi
  11. 11. sij

    Thanks for all that you do for the infosec community Phil!

    Poništi
  12. 8. sij

    Want to find out what users exist in a domain but you don't have access to PowerShell or any of the Active Directory modules? Try this: wmic /NAMESPACE:\\root\directory\ldap PATH ds_user GET ds_samaccountname

    Poništi
  13. 2. sij

    One of the most difficult things to accept about working in infosec is that there are so many specialties and not enough time to get good at them all. However, it does keep me motivated to continuously learn new things. It's definitely a positive thing!

    Poništi
  14. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  15. 22. stu 2019.
    Poništi
  16. 11. stu 2019.

    I recently saw a thread talking about the "right way" to get into security. Let me be the one to tell you, there is no predefined route into this industry. The truth is, infosec is a place where people with diverse backgrounds can thrive. If you have the drive, you'll succeed!

    Poništi
  17. 3. stu 2019.

    "Is this Threat Hunting?" , Great talk! was a fun time!

    Poništi
  18. 2. stu 2019.

    If you're at today come check out "Threat Hunting on a Budget" by and You'll learn a ton of useful information from some amazing Threat Hunters! At 1430.

    Poništi
  19. 29. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    25. lis 2019.
    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    22. lis 2019.

    Hi Twitter friends. Any public or threat hunting Slack channels out there?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·