Spencer Walden

@__Masq__

CTI & Det Research . Opinions mine. Also, videogames, gin, and tuuunes he/him

Seattle, WA
Vrijeme pridruživanja: travanj 2016.

Tweetovi

Blokirali ste korisnika/cu @__Masq__

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @__Masq__

  1. proslijedio/la je Tweet
    2. velj

    Today's study session 👩🏽‍💻💗 - Studying x86 Assembly(It has been a bit tedious not gonna lie) Sometimes I feel stupid lol - Reading more about Reverse Engineering. It's a topic I always liked but was scared to get more into. Does anyone have any Binary Exploitation exercises?

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Hey - Your product is shit and your company is shit. Not only is what you’re trying to do hurting society, but your delivery of it is completely worthless. Analyze this: 🖕

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    7. lip 2018.

    Ever wondered *how* those adverts manage to keep on finding you - even when you go incognito, switch devices, or never actually searched for the product in the first place? Let us count the (many, many) ways [THREAD]

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    29. sij

    1\ I've written a little compiler to ship ML models as standalone Yara rules, and done proof of concept detectors for Macho-O, RTF files, and powershell scripts. So far I have decision trees, random forests, and logistic regression (LR) working.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    looking for a job in security? looking for employees? been a while since i've seen a security job thread. let's post all of these here so people can network!

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    This might not be completely obvious, so I feel the need to say it. The sick day isn’t for your benefit. It is for the benefit of everyone else in the office. If you feel the need to be a hero, work from home.

    Poništi
  7. proslijedio/la je Tweet
    29. sij

    How to Red Team #1 - A twitter red team mind map Need credentials from the outside? 1. OSINT (Find e-mail/PII) 2. Social Engineer (Trick someone into clicking an e-mail you sent them w/o a payload) 3. Target External Services (Password Spray or find a vulnerable service )

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    29. sij
    Poništi
  9. proslijedio/la je Tweet

    Want to know a fun thing about CVE-2019-0604? Thousands of publicly exposed systems still run SharePoint 2007. Doesn’t matter as the advisory says it doesn’t apply to SP 2007, right? Wrong. Exploit absolutely works, product is out of support. Vuln scanners don’t detect.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    28. sij

    We've all received emails with no attachment and assume it's "safe" to open in a mail client (as long as we don't explicitly click on any URLs). Right? Not so much...

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    29. sij

    I made a goose that destroys your computer Download it free here:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    28. sij

    🚨 ATTENTION STUDENTS 🚨 Are you a current student? Are you looking to attend an infosec conference this summer? If so, this tweet is for you! I am gifting one student a pass to *. Reply to this tweet with your major to be entered and I'll select a winner. Good luck!

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    29. sij

    Document unto others as you would have others document unto you.

    Poništi
  14. proslijedio/la je Tweet
    24. sij

    Post-exploitation tip: Do you know how to trivially & remotely hijack an session without prompt nor warning on user's side using signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details:

    Poništi
  15. proslijedio/la je Tweet
    24. sij
    Poništi
  16. proslijedio/la je Tweet
    27. sij

    What issues do people have with a rollout in an enterprise? Log volume? I’ve seen orgs worried about 20GB of daily Sysmon log data, while at the same time spending a 6 figure sum on a license to process 500GB of daily firewall log data. (which is mostly useless)

    Poništi
  17. proslijedio/la je Tweet

    Big change coming to Windows Server this March - insecure LDAP requests will be rejected by default. That's a change in behaviour which will absolutely break things in some orgs How to get in front of the issue:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    27. sij

    Windows Kiosk breakout tip: If you get a Printing panel, and the traditional methods don't work: Amongst the printers, select "SendTo OneNote" OneNote will launch -> Add new notebook On the Notebook -> New page Type: \\127.0.0.1\c$\windows\system32\cmd.exe Click the link

    Poništi
  19. proslijedio/la je Tweet
    27. sij

    Flamingo is a new open source tool from for capturing credentials sprayed by IT and security products: (h/t to for HTTP NTLM support!)

    Poništi
  20. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·