Brent Muir

@bsmuir

Professional in APAC: Fighting the good fight & searching for a decent cup of coffee! Opinions are my own & do not reflect those of my employer.

Vrijeme pridruživanja: studeni 2011.

Tweetovi

Blokirali ste korisnika/cu @bsmuir

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bsmuir

  1. prije 6 sati

    Subsystem for () version 2 - the other "other" attack surface - .

    Poništi
  2. prije 6 sati

    highlight the increasing geopolitical tensions in the Middle East, with destructive attacks predicted to rise.

    Poništi
  3. proslijedio/la je Tweet
    prije 8 sati

    🎦 My talk at has been published! "A journey through ESIL: understanding code emulation within radare2" is aimed to be a simple introduction to the inner workings, the power and the practical usage of 's ESIL. Hope you like it! 😉

    Poništi
  4. proslijedio/la je Tweet

    Coming soon to Sysmon: clipboard logging for malicious RDP session DFIR, and shredded file recovery for capturing hacking tools

    Poništi
  5. proslijedio/la je Tweet

    Also coming soon: Process Explorer dark mode

    Poništi
  6. prije 17 sati

    More hardcoded credential woes for ; firmware for DVRs, NVRs and IP cameras contains easily recoverable root credentials and debug on port 9530.

    Poništi
  7. proslijedio/la je Tweet
    prije 18 sati

    Stay positive Lolbins... not! rundll32 advpack.dll, RegisterOCX calc.exe rundll32 advpack.dll, #12 calc.exe rundll32 advpack.dll, #+12 calc.exe rundll32 advpack.dll, #-4294967284 calc.exe

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    3. velj

    1/ I just published Hitting a CurveBall Like a Pro! Using to detect and hunt exploits by following the NSA advisory

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    4. velj
    Poništi
  10. proslijedio/la je Tweet
    3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    My Linux Memory Grabber tool now prefers to use AVML for memory capture (falling back to LiME if AVML fails)

    Poništi
  12. 4. velj

    Part 3 of 's excellent deep dive into security mechanisms and . Shout out to , which is leveraged also.

    Poništi
  13. proslijedio/la je Tweet
    3. velj
    Poništi
  14. proslijedio/la je Tweet

    To the person who figured out my honeypot is a honeypot could you please stop putting the picture of Pooh bear with a jar of honey on it? Its like this person's life mission, I've blocked him on: - Client - IPs (now on Tor ffs) - The image (he just edits 1 pixel every time...)

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    2. velj

    Need a Reference Architecture? Check out this one showing how technology enables this strategy/access model. Slide 14 of CISO Workshop Module 3

    Poništi
  16. proslijedio/la je Tweet
    3. velj

    You've read Sun Tzu's art of war, but have you watched "The ART of WAREZ?", the untold story of Internet beat boyz, scene crews and the art work that inspired them

    Poništi
  17. 3. velj

    This is brilliant! Knowledge for all.

    Poništi
  18. 3. velj

    Britain allowing to provide technology is undermining their sovereign , posits .

    Poništi
  19. proslijedio/la je Tweet
    2. velj

    iOS Screen Time research final product. Now to add it to iLEAPP and call it a night. 🌜

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    1. velj

    New SpiderFoot 3.0 tutorial showing how to extract and addresses from websites, with automated blockchain querying to get balances using the SpiderFoot 3.0 CLI.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·