Justin

@br0k3ns0und

security research engineer by way of | iron displacer

Vrijeme pridruživanja: kolovoz 2015.

Tweetovi

Blokirali ste korisnika/cu @br0k3ns0und

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @br0k3ns0und

  1. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  2. 15. sij
    Poništi
  3. proslijedio/la je Tweet
    15. sij

    God forbid the Audit-CVE event fires for CVE-2020-0601 but if it does and the "para" field starts with 30, it's a good chance you have a cert with custom ECC curve params. Here's how you can parse them to make sense of them.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    13. sij

    attack frameworks and tools continue to be leveraged by criminal groups and nation state actors. Find new ways to build behavioral detections against post-exploitation frameworks such as using Event Query Language (EQL) in this post →

    Poništi
  5. proslijedio/la je Tweet

    Wew okay, so there's some REALLY bizarre internet-wide scan traffic happening right now in . it started two/three hours ago, quieted down for a few minutes, then just started up again. I'm going to do my best to stream of conscious what's going on while we dig in:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    11. pro 2019.

    This year I learned about Event Query Language (EQL) from (Ross Wolf). It has quickly become an indispensable tool for analyzing Windows Event Logs. It has a bit of a learning curve, so I wrote an article to help people get started:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    4. pro 2019.

    Learn how Elastic Endpoint Security's behavior-based protections prevented a targeted attack on multiple endpoints and how Event Query Language (EQL) can be used to detect and prevent unwanted behaviors →

    Poništi
  8. proslijedio/la je Tweet
    2. stu 2019.

    Awesome time at today! Here are the slides from my talk on "ATT&CKing with EQL".

    Poništi
  9. proslijedio/la je Tweet

    If you're attending this weekend, check out 's talk on "ATT&CKing with EQL." He'll break down the capabilities of a post-exploitation framework and share his process for building behavioral detections using EQL.

    Poništi
  10. proslijedio/la je Tweet
    15. lis 2019.

    We’re pleased to introduce Elastic Endpoint Security, a new solution which, combined with Elastic , provides a single experience for real-time threat prevention, detection, and response. Plus, say goodbye to endpoint-based pricing →

    Poništi
  11. proslijedio/la je Tweet
    29. ruj 2019.

    If you want to learn about ⁦ and preparing your telemetry for effective threat hunting⁩, I’m hosting a lunchtime session at the SANS THIR summit on Tuesday, 10/1

    Poništi
  12. proslijedio/la je Tweet
    26. ruj 2019.

    We are proud to launch our brand new interactive XSS cheatsheet featuring novel vectors from

    Poništi
  13. proslijedio/la je Tweet
    17. ruj 2019.

    Happy to release the API-To-Event project 😊🍻A repo focused primarily on documenting the relationships between API functions and security events. Mapped to ⚔️ API-To-Event List: GitHub:

    Poništi
  14. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    6. ruj 2019.

    Thank you everyone for attending my talk: "How do I detect technique X in Windows?" Applied Methodology to Definitively Answer this Question Reverse Engineers can have fun building detections too! :D Slides: Code:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    15. kol 2019.

    Bluetooth is broken: A third party can force a one byte encryption key on any Bluetooth connection in range, even between already paired devices. It's bad.

    Poništi
  17. proslijedio/la je Tweet

    I'm publishing some 🔥 research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation.

    Prikaži ovu nit
    Poništi
  18. 8. kol 2019.

    I found the source of the badges!!!

    Poništi
  19. proslijedio/la je Tweet
    7. kol 2019.

    At ? Come by our table and chat with SJ, Justin and Jesse about military-grade protection that’s as simple as AV.

    Poništi
  20. proslijedio/la je Tweet
    3. kol 2019.

    BTW, I would recommend NOT using the self-checkin kiosks at . I'm not saying they actually so this, but their privacy policy allows them to use your ID scans to enroll you in their facial recognition systems. (Sections 3 and 15 of )

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·