Chris Vazquez

@chris90980472

SEHKURATAY

Lost Angels
Vrijeme pridruživanja: srpanj 2018.

Tweetovi

Blokirali ste korisnika/cu @chris90980472

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @chris90980472

  1. proslijedio/la je Tweet
    31. sij

    The CFP for fwd:cloudsec is now open! Details at Also we've got a logo, so finally we can start handing out stickers soon.

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    30. sij
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Has anyone (boss, client, student, etc) ever asked you in what Windows event log can you find a process, IP address, InterfaceUuid, etc? Very helpful to identify providers that you might need to start collecting data from. is using online interactive

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  6. proslijedio/la je Tweet
    30. sij
    Poništi
  7. proslijedio/la je Tweet
    30. sij
    Poništi
  8. proslijedio/la je Tweet
    28. sij

    New Blog Post from on Azure. Ryan discusses Azure and Azure AD's components, reviews some of the attacks, and release PowerZure to help understand the attacks. Link: PowerZure:

    Poništi
  9. proslijedio/la je Tweet
    22. sij

    New from - Revisiting Remote Desktop Lateral Movement This post discusses RDP lateral movement by leveraging mstscax.dll. Steven also is releasing SharpRDP with corresponding detection guidance for this attack technique. Post:

    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Despite its incredible security enhancements, PowerShell continues to be abused by adversaries. A strong knowledge of PowerShell enables defenders to effectively manage and respond to its abuse. (1/4)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    22. sij

    I just published a ~45 page whitepaper on attacking and defending terraform infrastructure as code in GitHub. Includes attack scenarios, hardening, detections, etc. Deep thanks to and for their inspiration and research. ❤️ 1/3

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    Have and deploying Microsoft Defender ATP??? Check out this deployment guide 🤗

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    17. sij

    Live now: BadBlood an Active Directory Object Creator and Security Generator

    Poništi
  14. proslijedio/la je Tweet
    15. sij

    Check it out the NEW Center Alerts Reference Guide. A complete list of ASC alerts based on the different categories

    Poništi
  15. proslijedio/la je Tweet
    15. sij

    Want to attend ? 🎉 We have an Expo Plus pass to give away! To enter for your chance to win, you must be following us () + like and RT this tweet! A winner will be chosen this Friday 1/17 at noon ET, good luck!

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    14. sij

    Wrote a small post about embedding external DLLs into a Task in Covenant. Shout out to for Covenant and his willingness to help in the BloodHound slack channel!

    Poništi
  17. proslijedio/la je Tweet
    14. sij

    Whoa. doing a walk through of OpenSOC scenarios. This format is awesome. Please do more like it.

    Poništi
  18. proslijedio/la je Tweet
    14. sij
    Poništi
  19. proslijedio/la je Tweet
    Poništi
  20. proslijedio/la je Tweet
    13. sij

    Want Free💰? Jump on the Citrix wagon! Pick a program on git clone cd check-cve-2019-19781 pip3 install -r requirements.txt cat hosts.txt | while read url ; do cve-2019-19781 ;done > loot.txt 2>&1 cat loot.txt | grep appear

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·