Hiroshi Suzuki

@herosi_t

A malware analyst, forensic investigator, incident responder and researcher. An international conference speaker and trainer such as Black Hat and FIRST.

Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @herosi_t

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @herosi_t

  1. Prikvačeni tweet
    20. lip 2019.

    Thanks to YOU, our course at have sold out now! However, don't worry about it. We will add several seats. Stay tuned!

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    The current BinDiff wrapper uses BinExport 11 due to the BinDiff 6 beta. Please enable BinExport 10 if you use the BinDiff 5

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    プロセスからEmotetを検知するWindows OS用ツールEmoCheckをGitHubに公開しました。Emotetの感染調査などにご活用ください。 ^TT

    Poništi
  4. 30. sij

    We will be delivering our training course "A Comprehensive Guide to Digital Forensics & Malware Analysis for Practical Incident Response" again at 2020. The registration has been opened. We will have a big update this year. Stay tuned!

    Poništi
  5. proslijedio/la je Tweet
    24. sij

    IEの未修正の脆弱性(CVE-2020-0674)を悪用するゼロデイ攻撃を国内でも確認しました。対策にはマイクロソフト社のワークアラウンドをご確認ください。^ST

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    24. sij

    3rd tool: A parsing tool for backgrounditems.btm. This file is stored the entries of "Login Items". (3/3)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    24. sij

    2nd tool: macOS Artifact Collector is a Forensic Artifact Collection Tool for macOS. It can collect artifacts in Time Machine backups and extended attributes too. (2/3)

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    24. sij

    Hello, guys! Finally, I have released new 3 tools for and for macOS. Please try them and have a nice weekend :) 1st tool: Norimaci is malware analysis sandbox for macOS. This tool was inspired Noriben sandbox. (1/3)

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    なんとSpecterOpsのAdversary Tactics: PowerShellトレーニングコース資料が公開されました!

    Poništi
  10. proslijedio/la je Tweet
    18. sij

    Bypassing Network Restrictions Through RDP Tunneling by >> Great example of the increasingly common technique using built-in netsh commands to port forward RDP traffic. This should be heavily audited on jump servers and admin boxes.

    Poništi
  11. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi
  12. proslijedio/la je Tweet
    17. sij

    「Japan Security Analyst Conference 2020」をトゥギャりました。

    Poništi
  13. proslijedio/la je Tweet
    17. sij
    Poništi
  14. proslijedio/la je Tweet
    17. sij

    時間オーバーしていて大事なことを言い忘れました。作成したツールのGithubのURLが書かれていますが、公開の準備が終わっていないので、まだリポジトリはありません。1月末までには公開したいと思います。

    Poništi
  15. proslijedio/la je Tweet
    17. sij

    の発表資料です。 Cc 「日本を狙うばらまきメールキャンペーンの脅威動向分析と対策」 //

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    17. sij
    Poništi
  17. proslijedio/la je Tweet
    14. sij

    Empire is easily in the top ten of exploit frameworks found in the wild. Blue teamers would be wise to educate themselves on the new capabilities.

    Poništi
  18. proslijedio/la je Tweet
    13. sij

    New blog post on the Microsoft Cloud: What is Azure Active Directory? Post covers what Azure AD is, how it compares to on-prem Active Directory, connecting via PowerShell, and password spraying attacks, mitigation, & detection.

    Poništi
  19. proslijedio/la je Tweet
    7. sij

    HSTS For Forensics: You Can Run, But You Can't Use HTTP by Daniel Milne ()

    Poništi
  20. proslijedio/la je Tweet
    3. sij
    Poništi
  21. proslijedio/la je Tweet
    5. sij

    Updated spotlight_parser to read iOS databases today!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·