Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @evan_pena2003
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @evan_pena2003
-
Evan Pena proslijedio/la je Tweet
Want to see how the
@Mandiant red team weaponizes@FireEye threat intel for R&D and TTP development? Check out some research I did with@evan_pena2003 and@FuzzySec. Also includes some new executables that can be used for DLL abuse.https://www.fireeye.com/blog/threat-research/2020/01/abusing-dll-misconfigurations.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Evan Pena proslijedio/la je Tweet
In this episode of our Eye on Security podcast,
@evan_pena2003 discusses our new#PurpleTeam Assessments, how they differ from a#redteam or#blueteam, and how@VerodinInc will be used to deliver this offering. >> Listen: https://feye.io/31GTu57 pic.twitter.com/LACmOEZBt3Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I had the opportunity to participate in my first
@FireEye#podcast last week. The podcast discussed the delivery approach of our revamped#purpleteam assessment powered by@VerodinInc . Check it out here:https://www.fireeye.com/blog/products-and-services/2019/10/validating-detection-and-response-with-purple-team-assessments.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Evan Pena proslijedio/la je Tweet
Release of UhOh365: Office365 email validation script. See if an email is a valid o365 email address before you send emails! Unlike previously disclosed vulns and similar scripts, this does NOT require a login attempt and is even more stealthy! https://github.com/Raikia/UhOh365
#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Evan Pena proslijedio/la je Tweet
Check out latest
#StateOfTheHack where@ItsReallyNick & I interview@Mandiant red teamers@evan_pena2003 &@EriksocSecurity re: tool release that runs shellcode via DLL sideloading through LOLbins & injecting into arbitrary process via choice of 2 methodshttps://www.pscp.tv/w/1ZkJzApoMyZGv?t=1 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Such an honor to be on this series!https://twitter.com/FireEye/status/1184842545739776001 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Evan Pena proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Evan Pena proslijedio/la je Tweet
A theme
@ItsReallyNick and I have discussed a lot on#StateOfTheHack brought up by@evan_pena2003 Red team moving away from PowerShell based tooling/attacks to C# & shellcode due to improved visibility/detection/prevention by AMSI, EDR tools & better logging#FireEyeSummitPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hot off the press -
@EriksocSecurity and I just released an FireEye, Inc.#blog post discussing some of the latest#shellcode execution/injection techniques we use on the#redteam +#tool release! Blog: https://www.fireeye.com/blog/threat-research/2019/10/staying-hidden-on-the-endpoint-evading-detection-with-shellcode.html … Tool:https://github.com/fireeye/DueDLLigence …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Second part of the COM object research blog has been released, excellent work by
@h4wkst3r! This#redteam blog discusses how attackers abuse COM object methods exposed in properties and sub-properties.https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects-part-two.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Awesome blog post by
@MrUn1k0d3r! Blog talks about finding COM objects that allows an attacker to get arbitrary command execution:https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Evan Pena proslijedio/la je Tweet
Global Red Team Lead,
@evan_pena2003 discusses how@Mandiant’s robust#IOT methodology tests all inputs into consumer devices to see where#security vulnerabilities may exist for an organization. >> Learn more: https://feye.io/2riWNjl pic.twitter.com/vqvA871jwwRed Teaming: Internet of Things (IOT) SecurityConsumer products that connect into an organization’s enterprise network could be used by a cyber attacker as an initial foothold to access critical company assets.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Evan Pena proslijedio/la je Tweet
.
@evan_pena2003 explains how we continuously refine our#RedTeam Assessment methodologies & processes based on#ThreatIntel, helping our customers better detect and respond to real-world security incidents. >> Watch Series: https://feye.io/2PVTcTv pic.twitter.com/CgTXGrbx4cRed Teaming: An Intelligence-Led ApproachBy leveraging our extensive incident response and threat intelligence, we understand the modern threats pertaining to each specific industry.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Evan Pena proslijedio/la je Tweet
High definition stream of
#StateOfTheHack with@cglyer,@ItsReallyNick, and special guest, my favorite Red Teamer,@ramen0x3f. They are discussing#FIN6,#TRITON, Red Team tradecraft, and how@danielhbohannon isn't actually#BlueTeam. You won't want to miss it.https://twitter.com/FireEye/status/1118281285804466177 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Very proud to see the
@Mandiant@FireEye#redteam release an Offensive VM for Windows. We've had#Kali around for awhile, but haven't seen a Windows VM until now:https://www.fireeye.com/blog/threat-research/2019/03/commando-vm-windows-offensive-distribution.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Evan Pena proslijedio/la je Tweet
FireEye Blog |
#ICYMI: Shout-out to authors:@ItsReallyNick@QW5kcmV3@_gackerman_@a_tweeter_user@WylieNewmark for this FireEye blog post in which they talk compromise, RULER, and links to APT33:https://feye.io/2VxTimRHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Evan Pena proslijedio/la je Tweet
Wanted to call
#win32 api directly from#excel using#vba w/o declaring the signature 1st Call#ShellExecuteA: Application.ExecuteExcel4Macro "call(""shell32"", ""ShellExecuteA"", ""JJCCCCJ"", 0, ""open"",""calc"", """", """", 5)" JJCCCCJ return/param1/.../param6 J int C stringpic.twitter.com/v6EokqsLs3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Evan Pena proslijedio/la je Tweet
Find out more about our red teaming services by watching our "Red Team Operations" playlist on YouTube:https://feye.io/2rkQfR8
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thanks for the shout out
@Morg43https://twitter.com/Morg43/status/1055150442416615426 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Coming up with some nice COM exec
@MrUn1k0d3r https://github.com/Mr-Un1k0d3r/RedTeamPowershellScripts/blob/master/scripts/Remote-COMShellExec.ps1 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.