Tweetovi

Blokirali ste korisnika/cu @cr0nym

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cr0nym

  1. prije 18 sati
    Poništi
  2. proslijedio/la je Tweet
    Odgovor korisniku/ci

    W pewnym sensie mu zazdroszczę. Jest to osobnik całkowicie pozbawiony poczucia żenady.

    Poništi
  3. proslijedio/la je Tweet
    4. sij

    Detection rules should be treated as code. Changes tracked as they are tuned.

    Prikaži ovu nit
    Poništi
  4. 4. sij

    *if you* ofc ;-)

    Prikaži ovu nit
    Poništi
  5. 4. sij

    [+] Let's spray some love... Be patient... Just hunting for spraykatz by using custom infra, rules and - be sure to try this amazing stuff if I haven't had the chance yet!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    20. pro 2019.
    Odgovor korisniku/ci

    If more defenders and vendors did this, and truly cared about security, maybe we could crowd-source building detections (ideally in vendor agnostic formats). If defense shared in a similar manner to offense, I wonder how much further along we would be.

    Poništi
  7. proslijedio/la je Tweet
    11. stu 2019.

    Here is a [German] article about a Swiss Bank going the Open Source way - including a / right in the CI/CD pipeline. All integrated by our own .

    Poništi
  8. proslijedio/la je Tweet
    20. lis 2019.
    Poništi
  9. proslijedio/la je Tweet
    17. lis 2019.

    I published a docker image with a sample database, setting up a clean testing environment has never been as fast! Do `docker pull peterhgombos/bloodhounddemo` to get it. 1/6

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    6. lis 2019.

    Learning kids how to do a port scan? That’s at (and many other labs!)

    Poništi
  11. 7. lis 2019.

    A new technical blog post from Defensive Security Team is finally here! Let's hide behind a fake TLS fingerprint:

    Poništi
  12. 23. ruj 2019.

    In & Out EXFIL training is heading to Abu Dhabi during the ! Agenda is huge as always. Let's spend 3 days in the classroom together talking and doing the real exfiltration/C2/lateral movement stuff and more! See ya in !

    Poništi
  13. proslijedio/la je Tweet
    10. ruj 2019.

    Introducing : the first PRIME+PROBE cache attack over the network using technology. Here is NetCAT leaking keystrokes from a victim SSH client in real-time: Dennis

    Prikaži ovu nit
    Poništi
  14. 11. ruj 2019.

    Tired, but so happy :D Made it again - this time in ! The In & Out - Network Exfiltration Techniques training went so well! Your opinion gave me incredible energy for further action, but now it's time for a beer! Cheers

    Poništi
  15. 11. ruj 2019.

    My city! :) Have eyes at the back of your head :D

    Poništi
  16. proslijedio/la je Tweet
    8. ruj 2019.
    Prikaži ovu nit
    Poništi
  17. 2. ruj 2019.

    Sporo kolizji każdego dnia może warto chociaż pasy jezdni przemalować?

    Poništi
  18. 29. kol 2019.

    We had a really nice crowd in the class during the In & Out Training - 1st time delivered in ! It was a quiet class :P - can't hide, but the end reviews and evaluation forms are great. Thank you all for the awesome feedback! Crew - you guys rock!

    Poništi
  19. proslijedio/la je Tweet
    28. kol 2019.
    Odgovor korisnicima

    🤓 hmm, but here you just run a process inside the container. What about running a host process? That's easy, too. 😇 sudo docker -H unix:///google/host/var/run/docker.sock run -it --privileged --pid=host debian nsenter -t 1 -m -u -n -i sh And this isn't a security risk? 🤔

    Poništi
  20. proslijedio/la je Tweet
    24. kol 2019.
    Odgovor korisnicima i sljedećem broju korisnika:
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·