Eric Hutchins

@killchain

I'm an analyst. I co-authored the paper that introduced the kill chain to information security. Just my personal views here.

Vrijeme pridruživanja: studeni 2009.

Tweetovi

Blokirali ste korisnika/cu @killchain

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @killchain

  1. Prikvačeni tweet
    26. srp 2015.

    Our enterprise CND platform is built on Python and Yara. Check out the white paper:

    Poništi
  2. proslijedio/la je Tweet
    14. sij

    Now that it's all public: 1) CVE-2020-0601 - Windows doesn't properly validate X.509 certificate chains. 2) CVE-2020-0609, CVE-2020-0610 - Windows Remote Desktop Gateway (not to be confused with RDP proper) unauthenticated RCE.

    Prikaži ovu nit
    Poništi
  3. 11. sij

    Very cool! Rust implemented tokenizer library with python bindings. Best of both worlds

    Poništi
  4. proslijedio/la je Tweet
    19. pro 2019.
    Poništi
  5. 10. pro 2019.

    The irony that by following ⁦⁩ to learn about state of the art NLP transformers, this is what Twitter thinks I’m interested in

    Poništi
  6. proslijedio/la je Tweet
    3. pro 2019.

    Metaflow, a human-friendly data science framework that we've been working on for the past two years, is now open-source! I am incredibly proud of the team at and  who made the release happen. Take a look and let me know what you think!

    Poništi
  7. 23. stu 2019.

    Great article ! We find value in value in collaborative red/blue testing on a per-tactic basis. Rather than just emulate an end-to-end kill chain, focus on individual steps

    Poništi
  8. 23. stu 2019.
    Poništi
  9. 21. stu 2019.
    Poništi
  10. 21. stu 2019.

    Building timelines is an essential analytical task. Great visualization

    Poništi
  11. proslijedio/la je Tweet
    14. stu 2019.

    Not speaking to any specific targets, but, the activity group we track as ZIRCONIUM (roughly apt31) had been targeting US organizations and companies associated with trade heavily in 2018. Their actions appeared to immediately follow country to country disagreements.

    Prikaži ovu nit
    Poništi
  12. 12. stu 2019.
    Poništi
  13. proslijedio/la je Tweet
    5. stu 2019.

    At I spoke on advancing InfoSec learning by an open, community based approach I call the Githubification of InfoSec. Embrace , , notebooks. 👉🏻

    Poništi
  14. 30. lis 2019.

    How it’s formatted < what data it actually contains < how completely you put it into action

    Poništi
  15. proslijedio/la je Tweet
    30. lis 2019.
    Odgovor korisnicima

    Your assumptions are spot on based on our data, last we checked on a large MISP instance at , ~70% was CSV, 20% MISP JSON standard format, 8-9% Suricata/Snort/Zeek, 1% Other (including all the export format including RPZ, STIX and STIX2 in that specific order).

    Poništi
  16. 16. lis 2019.

    One of the reasons we wrote RDP parser for is to log keyboard layout and screen resolution settings negotiated during connection set up

    Poništi
  17. 15. lis 2019.

    Super proud of teammate Zach Kelly’s RDP parser, and grateful to our leaders for pushing the open source release

    Poništi
  18. proslijedio/la je Tweet
    8. lis 2019.

    Heard at a meeting today: "Information sharing is the 'thoughts and prayers' of the cybersecurity community."

    Poništi
  19. 10. svi 2019.

    Just found this blog , wow what an awesome program!

    Poništi
  20. 23. ožu 2019.

    Amazing ! ’s Jupyter support is pretty cool too

    Poništi
  21. 19. ožu 2019.

    “Ladies of London Hacking Society” sounds awesome

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·