Jared Atkinson

@jaredcatkinson

| 2015 BHUSA Minesweeper Champ | Aspiring Beard Model | | PowerShell MVP | PowerForensics | Hunter | AF Vet |

Seattle, WA
Joined July 2013

Tweets

You blocked @jaredcatkinson

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @jaredcatkinson

  1. Retweeted
    23 hours ago

    How sure are you that "(Verified) Microsoft Windows" refers to a program that actually originates from Microsoft? Code Signing Certificate Cloning Attacks and Defenses

  2. Retweeted
    Dec 21

    [Get-Doppelgangers] - Powershell script to detect process and dll doppelganging thx for the poc!

  3. Dec 18

    ICYMI, Check out 's take on Data Quality for Threat Hunting!

  4. Dec 15

    Collecting data for data sake is often misguided. Check out this post for some ideas for making sure you are collecting the right stuff!

  5. Retweeted
    Dec 13
  6. Retweeted
    Dec 12

    Our February training offering of Adversary Tactics: Red Team Operations is officially sold out. Waitlist is available. More course offerings to be announced shortly.

  7. Dec 11

    I know I'm late to the game, but I'm super excited to join everyone in Hannover for !

  8. Retweeted
    Dec 11

    Super stoked to have been selected for 2018. Will talk BloodHood & Empire automation. See you in Hannover... 🤖

  9. Dec 11

    Excited to be a part of the lineup this year!

  10. Retweeted
    Dec 11

    Report that maps 's actions to (Adversarial Tactics, Techniques, and Common Knowledge matrix): - Credential Dumping - DLL Injection - Network Service Scanning - PowerShell - Process Hollowing - Screen Capture ...

  11. Retweeted
    Dec 5

    I did a quick write-up on my method of getting BadIntent for Android set up.

    Show this thread
  12. Retweeted
    Dec 6

    We're ready for you ! Our workshop starts in 45 minutes!

  13. Retweeted
    Dec 1

    Atomic Sysmon configs individually mapped to the ATT&CK Matrix anyone? is on fire! All this now requires is a little code to enable selective merging of technique detections. Detection unit testing FTW! /cc

  14. Dec 1

    This is a great analysis of the symbiotic nature of memory forensics and analysis of a live system for similar activity. Both are important, but cater to different use cases.

  15. Dec 1

    I love that provides a Docker image to get things up and running quickly for testing!

  16. Retweeted
    Nov 30
    Replying to and

    Btw if you told me 10 yrs ago I would be amazed with "powershell" work, I would have laughed. All this has shown that snobby asm/driver/C level idiots (myself) can learn internals from higher level OS experts.

  17. Retweeted
    Nov 27

    Our resident application whitelisting breaker/expert, shows us the steps involved in developing one of the most strict types of Device Guard code integrity policies.

  18. Retweeted
    Nov 26
  19. Retweeted
    Nov 24

    Killing net neutrality achieves exactly the same as software patents: it protects the big players from competing small players. Long term, this prevents consumers from making choices and thus harms innovation.

  20. Nov 22

    Completely agree! I got started with PS by reading this book over a weekend! (That’s a lot of lunches in 2 days)

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·