Jeff McJunkin

@jeffmcjunkin

I came from the blue team, now I hack for a living. Certified SANS instructor in Oregon. Background: sysadmin, web/net pen test, forensics. GSE #128. He/him.

Southern Oregon
Vrijeme pridruživanja: travanj 2008.

Tweetovi

Blokirali ste korisnika/cu @jeffmcjunkin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jeffmcjunkin

  1. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  2. proslijedio/la je Tweet
    prije 9 sati

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  3. proslijedio/la je Tweet
    prije 12 sati

    Yearly reminder to remove PowerShell V2 EVERYWHERE. Doesn’t matter what EDR , logging, witchcraft you have in place. If an attacker has access to the Posh V2 runtime, they can automatically bypass it all.

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    Sunday (I admittedly don’t watch) reminds me access to safe, productive activities and knowledge to provide our youth with opportunity to explore, where the alternative is danger. Sports and/or , we NEED it! 🏈🤓👩🏻‍💻👩‍🏫👩‍🔬

    Poništi
  5. proslijedio/la je Tweet
    25. sij

    (A few) Ops Lessons We All Learn The Hard Way -- a Twitter 🧵:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    29. sij

    It looks like the incedent response card game "Backdoors & Breaches" from is back in stock on Amazon. Grab it before it sells out.

    Poništi
  7. 30. sij

    Nowhere is safe. Not the radio, not your grocery store, and now... ...not even your Twitter feed is free of

    Poništi
  8. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima

    The worst thing about is that there are so many good talks that they have to conflict with each other. It's a very good problem to have.

    Poništi
  9. proslijedio/la je Tweet

    Booked your ticket to in San Diego? Here's what the ticket includes: Access to all Talks, Labs & Workshops, B&B Tourny, Capture the Flag; All Special Events, one awesome kick-off party, food and much more!! Register now at

    Poništi
  10. proslijedio/la je Tweet
    28. sij

    Just a reminder that I’m always on the lookout for compromised Linux images that I can use for labs in my Linux Forensics training! Please RT for reach...thanks!

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    Now that I've officially given notice: I apologize for the subterfuge, but this is me. I'm still looking! Happy to answer any questions about my skillset or timeline. I've very much enjoyed my time at Walmart, but remote work isn't a good fit for me, which necessitates a job hop

    Poništi
  12. proslijedio/la je Tweet
    25. sij

    I don't think and get enough credit for really driving a massive change in the way infosec views active directory. Novel attacks and C2 are great, but Bloodhound has cultivated a whole new school of thought in infosec. Its a whole different level of awesome.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. proslijedio/la je Tweet

    It's a Wilder, Wester, Hacker Fester!! in San Diego has Hands-on Labs, Workshops, Escape Room, Tool Shed, Lock-picking Gun Fight, a fantastic line-up of Speakers, two day pre-conference training and more! Don't miss out register today..www.wildwesthackinfest.com

    Poništi
  15. 22. sij

    The year is 2020, and many common binaries still don't fully integrate ASLR. ASLR+DEP need to be enabled on all modules to be maximally effective.

    Poništi
  16. proslijedio/la je Tweet

    We need your help to choose the design for this year's Way West Wild West Hackin' Fest conference shirt. Which design would you prefer on a super-soft high-quality t-shirt? Reply with A, B, or C. These are the finalists of our t-shirt contest.

    Poništi
  17. proslijedio/la je Tweet
    21. sij

    Ready to testify before the Washington State Senate today on cybersecurity risk in mobile device repair.

    Poništi
  18. proslijedio/la je Tweet
    21. sij

    We released a Red Teaming book! Red Team Development and Operations. It's been a crazy project that has existed in many forms. It started as simple notes, came together as a SANS class, and will now live as a book. Read about it here.

    Poništi
  19. proslijedio/la je Tweet
    20. sij

    I recently updated Get-PE in PowerShellArsenal to parse out the debug directory so that PDB strings can be extracted programmatically. I did it because needed to confirm the absence of debug strings as one of many post-build OPSEC checks. Dude is master operator. 😍

    Poništi
  20. proslijedio/la je Tweet
    17. sij

    Live now: BadBlood an Active Directory Object Creator and Security Generator

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·