Héctor García

@endeavourhgp

Computer Engineer, Pentester, sometimes Incident Handler, and Guitarist.

Mexico City
Vrijeme pridruživanja: studeni 2009.

Tweetovi

Blokirali ste korisnika/cu @endeavourhgp

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @endeavourhgp

  1. proslijedio/la je Tweet
    2. velj

    Need a Reference Architecture? Check out this one showing how technology enables this strategy/access model. Slide 14 of CISO Workshop Module 3

    Poništi
  2. proslijedio/la je Tweet
    17. sij

    son of a fucking bitch

    Poništi
  3. proslijedio/la je Tweet
    13. sij
    Odgovor korisnicima

    Internet World Stats.

    Poništi
  4. proslijedio/la je Tweet
    8. sij

    Evolution of the alphabet

    Poništi
  5. proslijedio/la je Tweet
    18. pro 2019.

    I have retroactively fixed everybody's complaint about movie hacking/reverse engineering not being realistic.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    29. stu 2019.

    These modules can show you if a target has antivirus software, if it's a VM, network and software configuration info, and even password hashes.

    Poništi
  7. proslijedio/la je Tweet
    23. stu 2019.

    TFW the incident response team is hyper-focused on remediating the ransomware event, but doesn't realize that's being used as a cover for a larger intrusion...

    Poništi
  8. proslijedio/la je Tweet
    18. stu 2019.

    We have open sourced our legal documentation used for physical penetration tests. The purpose is to help the community and organizations protect their employees when conducting testing. Includes three docs: MSA SOW Authorization Letter

    Poništi
  9. proslijedio/la je Tweet

    Outstanding animated globe shows a year worth of earthquakes by depth (July 2017 to July 2018). In the interactive online version you can click on each individual to learn more. Epic ! Source:

    Poništi
  10. proslijedio/la je Tweet
    17. stu 2019.

    rsh - A tool purely written in python to easily generate reverse shell command for linux as well as windows

    Poništi
  11. proslijedio/la je Tweet
    14. stu 2019.

    "When Kirbi walks the Bifrost" In this post, talks about Active Directory attacks leveraging a MacOS AD joined endpoint. Check it out:

    Poništi
  12. proslijedio/la je Tweet
    5. stu 2019.

    "We've still got time to patch, there's no active exploit in the wild yet..."

    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. proslijedio/la je Tweet
    31. lis 2019.

    Data exfiltration: -Exfiltration with PowerShell: -Data exfiltration via DNS: -Data exfiltration via Empire: -Data exfiltration using CloakifyFactory:

    Poništi
  15. proslijedio/la je Tweet
    31. lis 2019.

    2019-10-31: 🆕 Possible (aka PROMETHIUM)😢 | Local Installer %TEMP% | Mimics as "spoolsrv32.exe" Printer Process 🛡️C2: upd32-secure-serv4 .com/ini.php 🔦Decode: XOR ^= 0x44|0x55 h/t MD5: 31c7ff354b4b64c34223b90b06cbac65

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    28. lis 2019.
    Poništi
  17. proslijedio/la je Tweet
    27. lis 2019.

    How Dropbox Security builds tools for threat detection and incident response | Dropbox Tech Blog

    Poništi
  18. proslijedio/la je Tweet
    24. lis 2019.

    Implementing a security team with no budget.

    Poništi
  19. proslijedio/la je Tweet
    8. lis 2019.

    The IDApython cheat sheets from Pavel Rusanov are now available as PDFs.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    7. lis 2019.

    Scoop: White-hat hacks Muhstik ransomware gang and releases decryption keys -new Muhstik ransomware targets QNAP NAS devices -infects devices via weak phpMyAdmin passwords -German dev got infected, paid, got annoyed, and then hacked back

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·