Joshua Wright

@joswr1ght

Hacker for Counter Hack, Tech Director for , SANS Senior Instructor. Photography at

Providence, RI
Vrijeme pridruživanja: srpanj 2008.

Tweetovi

Blokirali ste korisnika/cu @joswr1ght

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @joswr1ght

  1. 3. velj

    It’s Monday and the start of a week teaching SANS Security 504 in New Orleans. Looking forward to amazing questions from amazing students, and recounting my own IR failures from incidents past.

    Poništi
  2. 2. velj

    Is there an underground community of Groundhog Day chairpeople who coordinate the prediction of groundhog prognosticators? Is there a secret, back-channel communication platform? Do they use Signal?

    Poništi
  3. proslijedio/la je Tweet

    wow i just learned a thing about metasploit by accident that I wish I could go back and teach myself like ten years ago. i could have saved myself a collective year of typing and tab completion.

    Poništi
  4. 27. sij
    Prikaži ovu nit
    Poništi
  5. 27. sij

    New week new opportunities! I threw together a pair of scripts to monitor the clipboard on Windows and macOS to gather passwords from password managers. Make it an awesome week!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    27. sij
    Odgovor korisniku/ci

    I totally agree. It takes very little to mention the great ideas and works of other people.

    Poništi
  7. proslijedio/la je Tweet

    Do you enjoy analytics? Interesting stats? 📈 CHARTS AND 📊 GRAPHS??! Of course you do! Join us at the Closing Ceremony where I'll be taking a look at KringleCon II by the numbers.

    Poništi
  8. proslijedio/la je Tweet
    21. sij
    Poništi
  9. 20. sij

    This is my “30,000 people still run TELNET” face.

    Poništi
  10. proslijedio/la je Tweet

    Hacker Tools, Techniques, Exploits and Incident Handling is a great introduction to powerful hacking tools and techniques. Take it with in New Orleans at :

    Poništi
  11. 19. sij

    If you get bored with HHC2019, be sure to check out HHC2018, 2017, 2016... 🤙

    Poništi
  12. 18. sij

    I’ll be speaking about all of the challenges, and the thought process behind selecting the different techniques that we wanted to highlight this year.

    Poništi
  13. 18. sij

    I applied for a job at Circuit City in college. They told me I didn’t know enough about technology to work there. WHO’S LAUGHING NOW CIRCUIT CITY? (Not me, it still kind of stings)

    Poništi
  14. 16. sij

    CVE-2019-19781 is also pretty bad, but thanks to we have a simple scanning through Nmap NSE.

    Poništi
  15. 14. sij

    Helping people learn information security concepts while having fun is one of the greatest joys in my life. 🤘

    Poništi
  16. 8. sij

    You could alternatively use 's excellent PowerView tools, but I prefer to avoid adding that to systems if I can avoid it.

    Prikaži ovu nit
    Poništi
  17. 8. sij

    PS one-liner to create a txt file named for the Windows domain group, with a list of members in each file. Great for use with DPAT ().

    Prikaži ovu nit
    Poništi
  18. 1. sij

    JQ is intimidating at first, and invaluable after you use it for 10 minutes.

    Poništi
  19. 31. pro 2019.

    Thank you, as if I wasn't already terrified from Black Mirror seasons 1-5 ().

    Poništi
  20. proslijedio/la je Tweet
    30. pro 2019.

    : Event Query Language (EQL) is a powerful tool for defenders. In this article, shows us how to get started with EQL—complete with sample files to use as a tutorial.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·