Jonathan Renard

@icanhazshell

Red Team Operator; Penetration Tester; Lifetime n00b

Joined August 2015

Tweets

You blocked @icanhazshell

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @icanhazshell

  1. Pinned Tweet
    Aug 16

    New blog post: Exploiting vulnerable 2.4 GHz wireless peripherals (aka mousejacking) to make it rain shells! Link:

  2. Retweeted
    Sep 7

    Using Malleable C2 to exfil files via an HTTP header or URI? Nice! Be advised: no magic! Your throughput will suffer. It's a limited channel

  3. Aug 30
  4. Aug 28

    Having a trusted agent read on != purple teaming

  5. Jul 17

    I'll be hanging out at and in just a week or so! If you see me, feel free to say hello... I'll be the one with the beard

  6. Jun 6

    New blog post in the works! Stay tuned...

  7. Retweeted
    May 31

    I’m still looking for a company that’s willing to host a class in the NoVA/DC area. Incentives are available.

  8. Jun 5

    DA is just the beginning, not the end goal. After DA, it's time to prove impact. You aren't trying to impress other hackers...

  9. Apr 10

    I don't always touch disk, but when I do, I make sure it's the standard Metasploit EXE template...

  10. Mar 28

    Not sure what the big fuss around the "Rubber Ducky" USBs is all about... they look pretty childish to me! :P

  11. Mar 16

    Blog's visual makeover is coming along nicely. If you had any feedback, let me know! (Still working through the "mixed content" SSL issue)

  12. Mar 3

    I always wanted to be ATD...

  13. Mar 3

    Today is my last day at . Great company and people; thanks for everything these past two years!

  14. Feb 24

    Anyone have experience with migrating to a new blogging platform and retaining pageranking / reputation with Google?

  15. Feb 11

    It took a year, but I finally have a new blog post. This time, the topic is lateral movement with PSExec! Link:

  16. Jan 30

    This is a new one... X-XSS-Protection: 0 Thanks for the assist, web server!

  17. Jan 11

    After many failed attempts, finally popped XSS by HTML encoding the following payload: <img src="x:x" onerror="al\u0065rt(1)>. w00t w00t!

  18. Retweeted

    Part of the appeal of infosec to me is their aren't really any experts; the pace of change is so fast you will always be learning.

  19. 12 Dec 2016
  20. Retweeted
    22 Nov 2016
    Replying to

    I never assume breach. I just breach.

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·