Andrew Robbins

@_wald0

Adversary Resilience Lead at . Co-creator of with and . Please consider donating to MDA:

Seattle, WA
Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @_wald0

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_wald0

  1. Prikvačeni tweet
    25. srp 2019.

    Question: How do I abuse a relationship that is showing me? Answer: Right click the edge and click "Help" for lots of useful info including abuse instructions, opsec considerations, and references.

    Poništi
  2. proslijedio/la je Tweet
    prije 4 sata

    Bloodhound on an ultra wide curved monitor makes you feel like you’re hacking Hollywood Style.

    Poništi
  3. proslijedio/la je Tweet
    25. srp 2019.

    Question: How do I abuse a relationship that is showing me? Answer: Right click the edge and click "Help" for lots of useful info including abuse instructions, opsec considerations, and references.

    Poništi
  4. proslijedio/la je Tweet
    2. velj
    Poništi
  5. 31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    You have a good understanding of & are interested in ? Come & learn some Cypher at ! Hands-on BloodHound - Intro to Cypher Workshop will be given by 😎

    Poništi
  7. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  9. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  10. 24. sij

    : - Steven’s recent COM/RDP research perfectly demonstrates his problem-solving ability, operational vision, and technical expertise.

    Poništi
  11. proslijedio/la je Tweet
    24. sij

    We offer a one-day training "Hands-on BloodHound - Intro to Cypher" by at ! offers a unique way of viewing Active Directory. Learning some is a must if you want to get the most out of BloodHound!

    Poništi
  12. proslijedio/la je Tweet
    23. sij

    Two eternal truths: 1) compartmentation is the foundation of security 2) trust relationships are the foundation of compromise

    Poništi
  13. 22. sij

    This is one of the most exciting bits of research and tooling produced at SpecterOps in recent memory.

    Poništi
  14. 17. sij

    - Folks who have directly or indirectly made material contributions to upcoming features: , , , , ,

    Poništi
  15. 17. sij

    This has been a very long time coming, thank you so much David for developing and sharing this! The applications for this of course go far beyond BloodHound, but if you're looking for the best way to play with BloodHound, this is it!

    Poništi
  16. 16. sij

    Unsolicited professional advise thread. Reply to this with your unsolicited professional advise. I'll go first. In everything you do, ask yourself: "How does this provide value?"

    Poništi
  17. proslijedio/la je Tweet
    15. sij

    Fun fact for the day: IntegrityLevel within process creation events provides context to detection opportunities. Example: Open powershell as administrator, the integrity is "High". Processes running under that process will now be high as well. (1/5)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    13. sij

    New blog post on the Microsoft Cloud: What is Azure Active Directory? Post covers what Azure AD is, how it compares to on-prem Active Directory, connecting via PowerShell, and password spraying attacks, mitigation, & detection.

    Poništi
  20. proslijedio/la je Tweet
    10. sij

    Recently I was on a pentest and needed to manage Active Directory groups from Linux to achieve privilege escalation. If you find yourself in a similar scenario, this is what you can do:

    Poništi
  21. 10. sij

    Whatever you do, do not miss this talk. Darren is an excellent speaker and even better GPO expert (he's THE GPO guy ;)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·