Ashley Shen

@ashley_shen_920

Senior Researcher @ FireEye / Black Hat Asia Review Board / BlueHat CAB / HITB review board / Co-founder of HITCON GIRLS / Threat Intelligence / Malware Analysi

Taiwan
Vrijeme pridruživanja: ožujak 2012.

Tweetovi

Blokirali ste korisnika/cu @ashley_shen_920

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ashley_shen_920

  1. Prikvačeni tweet
    19. pro 2019.
    Poništi
  2. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    23. sij

    Protect your system from the rise of targeted malware attacks. Read more at .

    Poništi
  4. proslijedio/la je Tweet
    19. pro 2019.

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Poništi
  5. proslijedio/la je Tweet
    16. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    10. pro 2019.

    Relasing the courseware for my ~decade old training on and It all started at Delhi. Made so many friends :)

    Poništi
  7. proslijedio/la je Tweet
    10. pro 2019.

    [Securelist] Windows 0-day exploit CVE-2019-1458 used in Operation WizardOpium

    Poništi
  8. proslijedio/la je Tweet
    24. lis 2019.

    There is Base64 encoded malicious stuff that one sees very frequently I made a cheat sheet for us so that we can learn and spot malicious stuff faster ⚡️

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    12. lis 2019.

    vHash is 's little-known fuzzy hash. I created a Maltego transform that pivots on it, providing files that matches vHash. There's no public information on how it works, but I've been using it for a while and found it super useful. Get it here:

    Prikaži ovu nit
    Poništi
  10. 10. pro 2019.

    Attended my first workshop and had a wonderful Android reversing training from . Also gave a lightening talk about "From Threat Intelligence to Pokemon Master". Thank you for everyone who make this weekend awesome!

    Poništi
  11. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  12. proslijedio/la je Tweet
    5. pro 2019.

    🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!

    Screenshot of the table of contents at maddiestone.github.io/AndroidAppRE
    Prikaži ovu nit
    Poništi
  13. 28. stu 2019.

    Yesterday I finally got a chance to join . The CTF was a lot of fun. Thanks for holding this event.

    Poništi
  14. proslijedio/la je Tweet

    We would like to thank (today!!! 🥳) and for making this year awesome for and all our members and friends!! 🎉🤗🙏🏼

    Poništi
  15. 28. stu 2019.

    I’m honored to be recognized as one of the "32 Influential Malware Research Professionals" in the new ebook of . Thank you , and to everyone who have supported me!

    Poništi
  16. proslijedio/la je Tweet
    25. stu 2019.

    What? A library that wraps IDA decompiler API and makes it usable? *and* documented? We just released a thing. Blog: Github: Docs!!!:

    Poništi
  17. proslijedio/la je Tweet

    I am pleased and honored to hold an IoT security-related community session at BlackHat EU 2019!

    Poništi
  18. proslijedio/la je Tweet
    5. stu 2019.

    The Japanese government will conduct a cyber exercise with ministries, agencies, and critical infrastructure companies from all the 14 sectors to simulate a cyberattack on critical infrastructure during Tokyo 2020 on November 8. 4,800 people will join.

    Poništi
  19. proslijedio/la je Tweet
    5. stu 2019.

    I've asked in a tweet if someone could do some PS1/WMI magic to kill all processes related to "vssadmin delete shadows" just to find out that already did that (for BitPaymer) Kill-Ransomware.ps1 My Tweet

    Prikaži ovu nit
    Poništi
  20. 25. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·