Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @aboutsecurity
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @aboutsecurity
-
Prikvačeni tweet
If you’re thinking about taking the
@SANSInstitute#AllRoundDefender SEC530: Defensible Security Architecture and Engineering in 2020, check out this review from a recent#SEC530 student that attended my class in Tokyo last week:https://www.linkedin.com/pulse/overview-new-sec530-defensible-security-architecture-course-finch …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nerd Joke Alert
So a TCP packet goes into a bar dressed as a UDP packet... what does he say to the bartender?
"QUIC get me a beer!"
#SEC530#SANSSecEast cc/@SOCologize
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
You sure? Wait until the DNS exfiltration lab ;)
#AllAroundDefender#SEC530#ThinkRedActBlue#SANSSecEasthttps://twitter.com/dfirence/status/1224433803537440772 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ismael Valenzuela @ #SANSSecEast proslijedio/la je Tweet
This is for anyone who wonders about the utility of
#networksecuritymonitoring in 2020. Not everyone computes in a 5g, cloud-first, beyond corp, zero trust, next-gen, SDN, whatever-else-hotness environment. Thousands of orgs just have to secure their Internet-connected things.https://twitter.com/campuscodi/status/1224042393453854720 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
On my way to
#SANSSecEast to teach#SEC530 getting some great news! (1) - I’m going to be doing a webinar on Architecting for#SecOps with a good friend and@TTP_0 co-founder by the end of this month (stay tuned for details!) and (2) I just got upgraded on my flight to#NOLA
pic.twitter.com/ZfYquuL7lo
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ismael Valenzuela @ #SANSSecEast proslijedio/la je Tweet
#DFIR Looking for more memory dumps to dig into? Here is my newest one! http://bit.ly/FOR526_Memory -> Win10x64_18362 DevVM Gargoyle-laden (thx@jalospinoso) acquired with dumpit (thx@msuiche) & analyzed with win10compression support (thx@MalwareMechanic)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Unpacking and tidying up some of my SANS books I still had in boxes after the move (still more to go in the garage). I’ve referred back to these tons of times since my very 1st class,
#FOR508 w/@j3ssgarcia in 2007. As#KonMari would ask: do they spark joy? Absolutely!!

pic.twitter.com/XReJJM6ouS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I love to use the SimpleHTTPServer module to run a quick web server to test payloads, POCs, etc. Here's a version that adds SSL+BasicAuth that is pip installable (still Python 2.7) https://github.com/tianhuil/SimpleHTTPAuthServer … pip install git+git://github.com/tianhuil/SimpleHTTPAuthServer.git@masterpic.twitter.com/13ztkBzXyt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mitigations against actively exploited IE Zero-Day (CVE-2020-0674/ADV200001) with PowerShell and Intune. WARNING: Mitigations come with "side-effects", most notably breaking PAC scripts. Details here https://poshsecurity.com/blog/mitigating-ie-zero-day-cve-2020-0674adv200001-with-powershell-and-intune … via
@kjacobsen#CVE20200674#IE#ZeroDaypic.twitter.com/AsGOKRmsuT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Detecting CVE-2020-0601 exploitation attempts on the network using a Zeek script via
@Zeekurity and@0xxon https://blog.zeek.org/2020/01/detecting-cve-2020-0601-with-zeek.html …#CVE20200601#NSM#BlueTeam#AllRoundDefenderpic.twitter.com/7DFMqChQli
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ismael Valenzuela @ #SANSSecEast proslijedio/la je Tweet
Thanks for the inclusion in the awesome new
#RedTeam book.@joevest and#jamesTubbervillenotonTwitter . Flipped through it, and it looks great! Very excited to dig into it on my flight tomorrow.#ZeroDay Edition

pic.twitter.com/xXf01uxnap
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ismael Valenzuela @ #SANSSecEast proslijedio/la je Tweet
Winter is Coming to the SANS Blue Team Summit training event Get ready for the debut of Cyber Defense NetWars II! Will you be the first to win this coin?
#blueteamsummit https://www.sans.org/event/blue-team-summit-2020/product/3730 …pic.twitter.com/w6DxC82NE2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ismael Valenzuela @ #SANSSecEast proslijedio/la je Tweet
Adversary Tactics: PowerShell Course book for Free.https://github.com/specterops/at-ps/blob/master/README.md …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I doubt this is the full technical report. There’s gaps i.e. the link between the egress traffic & NSO / HackingTeam infra (diamond model) among others. It’s a fun reading though with references to common
#DFIR techniques & tools like#Cellebrite#Wireshark &@ericlaw#Fiddlerhttps://twitter.com/hxhassan/status/1220111152287449089 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ismael Valenzuela @ #SANSSecEast proslijedio/la je Tweet
Our latest
@McAfee_Labs blogs provides technical detail and timeline of the work we did to analyze, reverse engineer and develop working exploits for the file signing certificates CVE-2020-0601 https://www.mcafee.com/blogs/other-blogs/mcafee-labs/curveball-an-unimaginative-pun-but-a-devastating-bug/ …#cybersecurity H/T@spovolny@fulmetalpackets@phLaulpic.twitter.com/87M2MngQUF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
On why you need a
#DefensibleSecurityArchitecture: ‘When asked why he published such a massive list of "bots," the leaker said he upgraded his#DDoS service from working on top of IoT botnets to a new model that relies on renting high-output servers from cloud service providers.’https://twitter.com/Seifreed/status/1219511776221499392 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Great resource! Thx for sharing Lenny!https://twitter.com/lennyzeltser/status/1219400866278576134 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ismael Valenzuela @ #SANSSecEast proslijedio/la je Tweet
I'm very excited to announce the release of the highly anticipated SANS SEC588 - Cloud Penetration Testing course. Congratulations to
@mosesrenegade on completing it. Watch for the beta announcement date soon: https://www.sans.org/course/cloud-penetration-testing …@SANSPenTestHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ismael Valenzuela @ #SANSSecEast proslijedio/la je Tweet
Potential passwords in scripts are bad... But shouldn't we find and fix those rather than blinding ourselves to modern malware?pic.twitter.com/2iNCdcmy9i
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
Former
