David Rowe

@davidprowe

Diving deep into Cloud Security. Avid Reader. North Shore beach bum, husband, and father. :linkedin :insta

Vrijeme pridruživanja: lipanj 2011.

Tweetovi

Blokirali ste korisnika/cu @davidprowe

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @davidprowe

  1. Prikvačeni tweet
    17. sij

    Live now: BadBlood an Active Directory Object Creator and Security Generator

    Poništi
  2. prije 2 sata

    It's insane how fast someone can run a few snippets of code and implant a way to keep a toe in a domain

    Poništi
  3. prije 4 sata

    You know what really grinds my gears? People sending LinkedIn Private Messages telling me to read blogs that suck

    Poništi
  4. prije 20 sati

    Those permissions applied in Badblood apply threats to the domain in a matter of seconds

    Poništi
  5. prije 23 sata

    Has anyone attempted to run Badblood and only run certain portions of the code? Had anyone tinkered around with the permission scripts yet?

    Poništi
  6. proslijedio/la je Tweet
    Poništi
  7. 4. velj

    I created BadBlood to simulate a wide variety of persistence attacks? How many backdoors can you find in your production AD environment?

    Poništi
  8. 4. velj

    Adding a Backdoor to AD in 400 Milliseconds

    Poništi
  9. 4. velj

    "Permissions applied in milliseconds?" What's that mean for an environment that's experienced a compromise?

    Poništi
  10. 4. velj

    "Panda pawed the purple pansies!" Belted my 5 year old tonight. "That's nearly impossible to say!" I bellowed back. Way Better than "Toy boat"

    Poništi
  11. 3. velj

    Adding a backdoor into AD in under 400ms. Coming soon.

    Poništi
  12. 3. velj

    I'm working on some more LAPS stuff with BadBlood. Persistence attacks are frightening on the victim.

    Poništi
  13. 31. sij

    "Oh sure. Move a computer! Here you go!" And just like that, you made an escalation path in Active Directory

    Poništi
  14. 31. sij

    If i missed anything on this LAPS ramble, let me know. It's quite easy to test additional permissions

    Poništi
  15. 31. sij

    Who Can See LAPS Passwords?

    Poništi
  16. 29. sij

    Whats appropriate to do after an Agile planning meeting?

    Poništi
  17. 29. sij

    I just found Hadestown on Spotify. I'm not sure whats happening, but i like it.

    Poništi
  18. 29. sij

    AD Privilege Escalation Exploit: The Overlooked ACL

    Poništi
  19. 27. sij

    I accidentally self destructed my test lab... Dag nab it

    Poništi
  20. proslijedio/la je Tweet

    OSINT Threat #2 - By Request Mrs. offered this fun a month ago. Without previous info, it was pretty rough. Confession: I had a small bit of insider information. Didn't need it though. Come see how! First - uh... observable landmarks?? 1/x

    Prikaži ovu nit
    Poništi
  21. 27. sij

    The Making of BadBlood

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·