Patrick Bareiß

@bareiss_patrick

Senior Security Research Engineer Speaker: DeepSec Vienna, BlackHat Europe Arsenal

München, Bayern
Vrijeme pridruživanja: listopad 2015.

Tweetovi

Blokirali ste korisnika/cu @bareiss_patrick

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bareiss_patrick

  1. Prikvačeni tweet
    22. sij

    The Attack Range solves two main challenges in development of detections: - quickly build a small pre configured lab infrastructure as close as possible to your production environment - perform attack simulation using Atomic Red Team

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 11 sati

    In this post, talks about our approach to Detection Engineering through Capability Abstraction using Kerberoasting as an example. Check it out:

    Poništi
  3. Can somebody point me to some documentation for the REST API of Caldera? I want to run an operation over the REST API. Thank you very much.

    Poništi
  4. 5. velj

    Looking forward to speak at . I will present my talk The return of detection engineering: detection development using Continuous Integration and Continuous Delivery (CI/CD). Looking forward to see you there.

    Poništi
  5. proslijedio/la je Tweet
    23. sij

    Simple yet great example of how MITRE ATT&CK T1458 can be simulated and detected using the attack_range.

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    Brilliant work by Patrick , attack_range now lets you configure your environment. a 💻 windows client (win10) ✅ a 🔍 splunk server (search head) ✅ a 📒 windows domain controller (2016) ✅ a 🔪 attacking machine (kali) ✅

    Poništi
  7. 22. sij

    So proud of the team:

    Prikaži ovu nit
    Poništi
  8. 22. sij

    Looking forward to get some feedback to the newest changes: - flexible build environment (windows dc, windows server, windows client) - dedicated attacking machine (kali linux)

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    15. sij

    Sigma rule to detect the exploitation of CVE-2020-0601 as noted by Reference - built-in feature, no Sysmon required - rule is generic & detects all future events generated by this source Rule

    Poništi
  10. proslijedio/la je Tweet
    2. sij

    I am super stoked for 2020. Today we start a joint adventure as FalconForce, providing highly skilled technical security services.

    Poništi
  11. proslijedio/la je Tweet
    17. pro 2019.

    How to return a favour for using open source signatures / rules in public repos: (ordered by complexity / effort ascending) 1. ⚠️ Report false positives (issue) 2. 🛠 Fix false positives (pull request) 3. 💎 Add new rules (pull request)

    Poništi
  12. proslijedio/la je Tweet
    16. pro 2019.

    Announcing the next EU ATT&CK Community workshop on 18-19 May 2020 in Brussels. Share you experiences with and learn from others!

    Poništi
  13. proslijedio/la je Tweet

    I am very sad about people who think that "hunting is cool, while detection engineering is boring"...

    Poništi
  14. proslijedio/la je Tweet
    5. stu 2019.
    Poništi
  15. 10. pro 2019.

    And a big thank you to , who inspired us with Detection Lab.

    Prikaži ovu nit
    Poništi
  16. 10. pro 2019.

    Would be happy to get some feedback.

    Prikaži ovu nit
    Poništi
  17. 10. pro 2019.

    In order to successfully test the effectiveness of your detection you need a lab and an attack simulation engine. Attack Range combines both into one open source tool:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    9. pro 2019.

    Got tired of dealing with broken link in 's . Sometimes the reference sites we provide go dead 💀👻! Wrote a quick blurb automatically checking them using . Hoping it can help you too 👍.

    Poništi
  19. proslijedio/la je Tweet
    8. velj 2019.
    Poništi
  20. 4. pro 2019.

    I mean the game tic tac toe.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·