Paul Laîné

@am0nsec

Security consultant at - cum lux abest, tenebrae vincunt

France & London
Vrijeme pridruživanja: rujan 2016.
Rođen/a 1997.

Tweetovi

Blokirali ste korisnika/cu @am0nsec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @am0nsec

  1. Prikvačeni tweet
    9. stu 2019.

    Plan. Execute. Vanish. cc: @capabilitiesgrp

    Poništi
  2. proslijedio/la je Tweet
    prije 18 sati

    Stay positive Lolbins... not! rundll32 advpack.dll, RegisterOCX calc.exe rundll32 advpack.dll, #12 calc.exe rundll32 advpack.dll, #+12 calc.exe rundll32 advpack.dll, #-4294967284 calc.exe

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    3. velj

    A very insightful breakdown on violent non-state actors (VNSA) and their ability to adopt the latest technology.

    Poništi
  4. 4. velj

    Turns out this is a massive pain to install Visual Studio w/ Ansible.

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  6. proslijedio/la je Tweet
    2. velj
    Poništi
  7. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  8. 2. velj

    Such a brilliant book for anyone interested by privacy. Even if this is extreme, there is things that can be implemented in order to stay under the radar. cc:

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    New writeup by me and of a new Iranian campaign we discovered! Special thanks to for assisting as well!

    Poništi
  11. 30. sij

    Pretty bad OPSEC and a good blog post.

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).

    Poništi
  13. 28. sij

    Every time I'm writing a new Cobalt Strike aggressor script my eyes are bleeding - but that's always worth it 🤔

    Poništi
  14. proslijedio/la je Tweet
    28. sij

    It’s a pricing trick. In handwriting analysis margins & letter size matter. This writer chose to place the “original” price on the left of the tag, leaving a big enough space on the right. Had it been a true discount, the price in blue would have been located in the center.. 🧵

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  16. 25. sij

    If anyone is interested by an example of the Windows Next Generation Cryptography API (bcrypt.lib) - especially after CVE-2020-0601 - I wrote a simple C++ program that encrypt and decrypt a string. Link:

    Poništi
  17. proslijedio/la je Tweet
    24. sij

    Join our Webinar: AVIVORE TTPs and Indicators of Compromise – Learn how your organisation can develop its capability to detect and respond to this new cyber threat group.

    Poništi
  18. proslijedio/la je Tweet
    24. sij

    Interesting recent change (at least 1903) to SeTokenCanImpersonate which determines if you can impersonate an access token. The Session ID is now checked so that you can't impersonate same user session 0 tokens outside of session 0.

    Poništi
  19. proslijedio/la je Tweet
    24. sij

    SOE: Subversion and Propaganda: The Fourth Arm

    Poništi
  20. proslijedio/la je Tweet
    21. sij

    New webinar! Our Threat Intel Tech Lead Oliver Fay will demonstrate how a new state-sponsored threat group "AVIVORE" use legitimate remote connectivity to hack into businesses. Register here:

    Poništi
  21. proslijedio/la je Tweet
    15. sij

    Hainan Xiandun Technology Company is APT40. They recruited Hainan based Cambodian linguists three months before APT40 conducted their Cambodia campaign.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·