Tweets

You blocked @adliwahid

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @adliwahid

  1. Retweeted
    May 11

    I made a docker container with 2 that will just magically take Zeek logs from a directory and load them up in a docker instance of elasticsearch. All open source. Next time I get a minute I'll add it to:

    Undo
  2. Retweeted
    May 11

    Often enough I find this image very useful to explain in one slide what . can do on the network

    Undo
  3. Retweeted
    May 10

    So there is EU proposal to weaken end-to-end encryption, and the most "funny" part, they ask the operators to protect the weaken part from abuse and it's the responsibility of the operator. An easy way to avoid the risk, don't do such regulation.

    Undo
  4. Retweeted
    May 9

    Watch Erik analyze Emotet network traffic. ⚙️ Extract DLL from PCAP 👾 Extract JA3 and JA3S hashes for C2 📃 Verify X.509 certificates ☝️ Fingerprint spam bot with JA3 📎 Extract email attachment

    Show this thread
    Undo
  5. Retweeted
    May 5

    That’s a wrap for today’s training courses and for this year’s symposium for Latin America and Caribbean region! Safe travels home and we can’t wait for our next partnered event! cc

    Undo
  6. Retweeted

    A report from details attacks leveraging embedded Linux to obtain long dwell times. In this post I discuss why embedded Linux is a massively underrated attack vector and how to monitor it with :

    Undo
  7. May 2

    Eid Mubarak & Selamat Hari Raya to all friends celebrating the occasion. I hope you had a fantastic Ramadan as well!

    Undo
  8. Retweeted
    May 1

    If anyone wants to play our mini Linux CTF that we created for , then please check it here: Created by: me + + Special thanks to for providing us with the CTF platform 🙏🏻

    Show this thread
    Undo
  9. Retweeted
    Apr 26
    Undo
  10. Retweeted
    Apr 19

    Industrialize the tracking of Botnet operations, a practical case with large Coin-Mining Threat-Actors - Presentation at FIRST CTI Summit 2021 by and

    Undo
  11. Retweeted
    Apr 18

    BREAKING: we found signs of a spyware infection at the 🇬🇧Prime Minister's office, 10 Downing St. We notified 🇬🇧. We'd found other infections within the Gov.. THREAD 1/ Must-read by :

    Show this thread
    Undo
  12. Retweeted
    Apr 9

    Will you be interested to join our ADVANCED workshop w/ to study & RE on how recent threats are using shellcode in their actions aim Win/Mac/Linux OS? This vote will decide workshop planning, your answers matter! cc:

    Undo
  13. Retweeted
    Apr 5

    TLS traffic to non-TLS ports is often a bad sign.

    TLS traffic to non-TLS ports in CapLoader
    Show this thread
    Undo
  14. Retweeted
    Apr 1

    has been updated and now includes the set of Yara Signature Base from (thanks!) Online service: Pandora open source repository:

    Undo
  15. Retweeted
    Apr 1

    New daily scan in place for DVR DHCPDiscover service on port 37810/UDP. This UDP-based JSON protocol (used to help manage DVRs) is abused for amplification attacks. Amp factor of ~25:1. Around 94k IPv4 services found worldwide, most in South Korea.

    Undo
  16. Retweeted
    Mar 17

    A critical part of performing is investigating network traffic. This video will show you how to install in to use offline mode for PCAP processing 👉 Feel free to leave comments & sub if you'd like to see more! 🙏

    Undo
  17. Retweeted
    Mar 14

    CERT Tonga launched a Cybersecurity Workforce Development Program(CWDP) on 14 March 2022,to help build practical skills and understanding of cybersecurity issues among practitioners. We thank our partner and the New Zealand Government for all the support and assistance.

    Undo
  18. Retweeted
    Mar 8

    New TP240PhoneHome reflective DDoS vector with record breaking amplification ratio. Shadowserver & private sector partners worked with vendor to investigate attacks & remediate: Vulnerable devices included in our free daily reports tag = CVE-2022-26143

    , , and 3 others
    Show this thread
    Undo
  19. Retweeted
    Mar 9

    The AIL project workshop is online on YouTube. This includes new features from AIL project and an introduction to monitoring using AIL. The Conti leaks import example by is quickly showed. Video: Slides:

    Undo
  20. Retweeted
    Mar 1

    RIPE NCC Executive Board Resolution on Provision of Critical Services The RIPE NCC Executive Board has approved the following resolution: “The RIPE NCC provides critical services to its membership spread across a diverse geographical and political region.

    Show this thread
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·