Emily

@ladyofpython

DFIR | honeypots | blueteam | MiSec

Vrijeme pridruživanja: lipanj 2017.

Tweetovi

Blokirali ste korisnika/cu @ladyofpython

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ladyofpython

  1. Prikvačeni tweet
    6. tra 2019.

    If you're curious about what honeypots are and why people use them in independent research and in enterprise secops, check out this article I wrote on Medium:

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    1. Windows Defender 2. EDR 3. Automated defanging of documents 4. Disabling macros, OLE, DDE, etc. 5. Disabling Windows Script Hosting 6. Private VLANs 7. Application whitelisting 8. Users not being local admins 9. 2FA on everything 10. Up-to-date patching

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    26. sij

    I don’t know who needs to hear this, but working on documentation IS NOT A WASTE OF TIME. Quality documentation will help your project proceed efficiently now and in the future.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    Come sign up for & I's training at in May! Just think DnD mixed with tabletops. It's team vs team in who can survive the longest. You might end up in the CEO role to make some hard decisions! Follow for more

    Poništi
  5. proslijedio/la je Tweet
    25. sij

    If you're not retaining things like DHCP logs, DNS logs, RDP logs, some kind of internal network monitoring/visibility, you should do that. Trying to hunt through 2 month old traffic is hard when you can't correlate IP to Endpoint because DHCP.

    Poništi
  6. proslijedio/la je Tweet

    The Western European medieval mind generally believed the world was coming to an immediate end and that they lived in the end times among the inscrutable ruins of a once-splendorous ancient world. And for this reason progress itself was not conceivable. I think about this a lot.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    24. sij

    Don't forget - both registration and the Call for Papers for A2Y.asm 2020 are *open*! CFP closes Feb 29. Also, we are looking for sponsors. Info/reg/CFP at

    Poništi
  8. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    22. sij

    So glad we got to spend some time w/ & if you have a chance to see her speak, make the time. You'll learn something. Also, check out her Also, Check out on podcast w/ &

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    11. sij

    The video game "VVVVVV" went today and someone discovered a several-hundred-case switch statement in the code. Beautiful. Disgusting. Source:

    Poništi
  11. proslijedio/la je Tweet
    3. sij

    He truly was a man ahead of his time.

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  12. proslijedio/la je Tweet
    4. sij

    Hey SIEM owners: How do you handle documentation & change control for your SIEM rule content?

    Poništi
  13. proslijedio/la je Tweet
    25. pro 2019.

    Picard holiday tip: Religion and commercialism will both fade over generations. Generosity and kindness, however, will endure.

    Poništi
  14. proslijedio/la je Tweet
    24. pro 2019.

    I, for one, welcome our festive Christmas tree overlords. 🎄🎄🎄😂

    Poništi
  15. proslijedio/la je Tweet
    12. pro 2019.

    Seems like Rambler filled copyright claim to regarding , nginx office under police raid (unconfirmed). Originally posted by , but somebody asked him to remove his post.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    12. pro 2019.

    Him: Just grabbed the domain admin’s *user* password. Me: Give it. Let’s see if they reused the pass for their DA account. Him: Surely, they wouldn’t. Me, looking at my access: They would. And don’t call me Shirley.

    Prikaži ovu nit
    Poništi
  17. 12. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    10. pro 2019.

    The containment phase of incident response when you've got a worm in the network.

    Poništi
  19. proslijedio/la je Tweet
    7. pro 2019.

    Cool. This is something normal people know how to do with zero problems.

    Poništi
  20. proslijedio/la je Tweet
    4. pro 2019.

    Smooth user migration between computers is almost literally indistinguishable from ransomware defense.

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    3. pro 2019.

    if anyone has done forensics on prison butt phones my DMs are open if you want to talk about it (i'm not joking, that would be interesting)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·