Jorge Orchilles

@jorgeorchilles

Professional Hacker | | | Certified SANS Instructor/Author | GFMA Threat-Led PenTest Framework and CVSSv3.1 co-author | ISSA Fellow

South Florida
Vrijeme pridruživanja: siječanj 2009.

Tweetovi

Blokirali ste korisnika/cu @jorgeorchilles

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jorgeorchilles

  1. Prikvačeni tweet
    8. sij

    Wild West Hackin' Fest - Way West (San Diego) training is up! I will be teaching the 2 day SANS : Red Team Exercises and Adversary Emulation course. Sign up now!

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Did you catch me in 's commercial?! I'm the one GEEKING out because SPACE! Don't forget to tweet using – Olay is donating $1 per tweet to support women in STEM! Do good...with someone else's money lollll

    Poništi
  3. 2. velj

    Thanks for all the feedback and factors to consider for the microphone poll! I am going to go with the lavalier as I like to move around, speak with my hands, and wear glasses. Will let you all know how it goes after the keynote Saturday for Secure Miami conference at FIU!

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  5. 31. sij

    Anyone use the AirPods Pro on Windows 10? How is the handoff between iphone and Win 10? Any other annoyances?

    Poništi
  6. 31. sij

    Follow Friday edition comes with a big thank you to for supporting Empire and porting it to Python3. Issue acknowledged and closed in under a week. Things we track on

    Poništi
  7. 31. sij

    I will be on a panel titled Strategic Malware Arms Reduction Treaty (SMART), due to my work on , at this year's Red Team Summit (internal red teams only; Chatham house rules). This is an important conversation.

    Poništi
  8. 30. sij

    Coalfire consultants that were arrested had their charges dropped! While this is good news, check out the statement made:

    Poništi
  9. 30. sij

    First conference that asks me what kind of microphone I want to use. I had to google to figure out what these were. Which should I go with?

    Poništi
  10. 30. sij

    VECTR update was just released version 5.4 is out! Thank you SANS has a lab for APT33 and this version makes it even easier to map already tested TTPs to adveraries!

    Poništi
  11. 30. sij

    Looking forward to the SCYTHE marketplace!!

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  13. 30. sij

    Generate cross-platform (Linux and macOS) beacons for Cobalt Strike with CrossC2

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    Excited to announce our Full Speaker Line Up for ! We have been overwhelmed with interest in the event, and thus have reached peak registration capacity. However, we are accepting registration applications for our waitlist.

    Poništi
  15. 29. sij

    Advisory Board for Rocky Mountain HackFest is almost complete! Looking forward to co-chairing this event with and working with these talented people:

    Poništi
  16. 28. sij

    Pulling Kali 2020.1 now. I am not a fan of upgrading current versions because things break.

    Poništi
  17. 28. sij

    This time DEFCON is really cancelled!!!! So much trolling that no one believes it when it is true!

    Tweet je nedostupan.
    Poništi
  18. 27. sij

    Sign up for Red Team Exercises and Adversary Emulation It includes conferences passes as well! Will be co-teaching with 2-day long lab is emulating the Iranian threat actor APT33!

    Poništi
  19. proslijedio/la je Tweet
    25. sij

    I want to thank everyone for the early support of our book, Red Team Development and Operations. If you haven’t picked up a paperback copy, Amazon is doing a 10% discount.

    Poništi
  20. proslijedio/la je Tweet
    27. sij

    The details for our next Adversary Simulation and Red Team Tactics training with and are now live, featuring new material!

    Poništi
  21. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·