Tweetovi

Blokirali ste korisnika/cu @evan_pena2003

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @evan_pena2003

  1. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  2. proslijedio/la je Tweet
    1. stu 2019.

    In this episode of our Eye on Security podcast, discusses our new Assessments, how they differ from a or , and how will be used to deliver this offering. >> Listen:

    Poništi
  3. 23. lis 2019.

    I had the opportunity to participate in my first last week. The podcast discussed the delivery approach of our revamped assessment powered by . Check it out here:

    Poništi
  4. proslijedio/la je Tweet
    22. lis 2019.

    Release of UhOh365: Office365 email validation script. See if an email is a valid o365 email address before you send emails! Unlike previously disclosed vulns and similar scripts, this does NOT require a login attempt and is even more stealthy!

    Poništi
  5. proslijedio/la je Tweet
    18. lis 2019.

    Check out latest where & I interview red teamers & re: tool release that runs shellcode via DLL sideloading through LOLbins & injecting into arbitrary process via choice of 2 methods

    Prikaži ovu nit
    Poništi
  6. 17. lis 2019.
    Poništi
  7. proslijedio/la je Tweet
    17. lis 2019.
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    10. lis 2019.

    A theme and I have discussed a lot on brought up by Red team moving away from PowerShell based tooling/attacks to C# & shellcode due to improved visibility/detection/prevention by AMSI, EDR tools & better logging

    Prikaži ovu nit
    Poništi
  9. 10. lis 2019.

    Hot off the press - and I just released an FireEye, Inc. post discussing some of the latest execution/injection techniques we use on the + release! Blog: Tool:

    Poništi
  10. 11. lip 2019.

    Second part of the COM object research blog has been released, excellent work by ! This blog discusses how attackers abuse COM object methods exposed in properties and sub-properties.

    Poništi
  11. 4. lip 2019.

    Awesome blog post by ! Blog talks about finding COM objects that allows an attacker to get arbitrary command execution:

    Poništi
  12. proslijedio/la je Tweet
    24. svi 2019.

    Global Red Team Lead, discusses how ’s robust methodology tests all inputs into consumer devices to see where vulnerabilities may exist for an organization. >> Learn more:

    Poništi
  13. proslijedio/la je Tweet
    8. svi 2019.

    . explains how we continuously refine our Assessment methodologies & processes based on , helping our customers better detect and respond to real-world security incidents. >> Watch Series:

    Poništi
  14. proslijedio/la je Tweet
    16. tra 2019.

    High definition stream of with , , and special guest, my favorite Red Teamer, . They are discussing , , Red Team tradecraft, and how isn't actually . You won't want to miss it.

    Poništi
  15. 28. ožu 2019.

    Very proud to see the release an Offensive VM for Windows. We've had around for awhile, but haven't seen a Windows VM until now:

    Poništi
  16. proslijedio/la je Tweet
    6. sij 2019.

    FireEye Blog | 📝 : Shout-out to authors: for this FireEye blog post in which they talk compromise, RULER, and links to APT33:

    Poništi
  17. proslijedio/la je Tweet
    8. pro 2018.

    Wanted to call api directly from using w/o declaring the signature 1st Call : Application.ExecuteExcel4Macro "call(""shell32"", ""ShellExecuteA"", ""JJCCCCJ"", 0, ""open"",""calc"", """", """", 5)" JJCCCCJ return/param1/.../param6 J int C string

    Poništi
  18. proslijedio/la je Tweet
    3. pro 2018.

    Find out more about our red teaming services by watching our "Red Team Operations" playlist on YouTube:

    Prikaži ovu nit
    Poništi
  19. 24. lis 2018.
    Poništi
  20. 19. lis 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·