Steve Campbell

@lpha3ch0

Senior Security Consultant, Penetration Tester, Retired Navy, GXPN, OSCP, OSWP. Interested in Offensive Security, ICS and SCADA.

Charlotte, NC
Vrijeme pridruživanja: kolovoz 2017.

Tweetovi

Blokirali ste korisnika/cu @lpha3ch0

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @lpha3ch0

  1. prije 1 sat

    My script will extract the hostname or IP address and port number for any http services in your Nessus report and save to a file for use with your http screenshot tool of choice.

    Poništi
  2. proslijedio/la je Tweet
    27. sij

    Flamingo is a new open source tool from for capturing credentials sprayed by IT and security products: (h/t to for HTTP NTLM support!)

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Closing a 2nd 100k month in a row. Really love each & every one of you❤️ To the haters who talk shit & say you can do it better: put in the hard work & prove it. 🎵Now they always say congratulations Worked so hard, forgot how to vacation They ain't never had the dedication🎵

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Some motivational words too long for Twitter

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    Check this out if you want to learn about a lesser known IDOR variant, how to leverage markdown for hacking, what Jason Haddix & Frans Rosén are up to these days & more!

    Poništi
  6. proslijedio/la je Tweet
    25. sij

    Our discord community is growing quickly! We'll be performing more ad-hoc and weekly live streams of hacking, TTP's, etc with several hosts from around the industry and occasional special guests. Come join the fun!

    Poništi
  7. 26. sij

    While watching an ICS pentesting conf pres on YouTube, speaker mentions risks including severe injury and “severe death”. Um, death isn’t severe, it’s FINAL. I know I’m nitpicking, but I just thought this was funny.

    Poništi
  8. proslijedio/la je Tweet

    Fun one - I’ve used a PS script that has comments explaining that it’s a test script for backwards compatibility and has some random tests in it then injects shellcode into memory (just a test remember 😂).. even has author from IT in comments.. hasn’t been picked up in months.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    24. sij
    Poništi
  10. proslijedio/la je Tweet
    21. sij

    Hi, Im looking for a Pentester job / missions 100% remote - no travel. I have 20 years of experiences in the IT, a master degree in infosec and an OSCP. Im now working on AWAE / OSWE.

    Poništi
  11. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  12. 22. sij

    I'll be speaking at on April 18th. I'm proud to say that my first conference pres will be held in the capitol city of my state of birth. :)

    Poništi
  13. 22. sij

    Watching videos convinced me to ditch nano and VSCode and fully commit to using vim.

    Poništi
  14. 18. sij

    One more reason to pay for an account on O'Reilly Learning: In addition to have pretty much every IT/infosec book you could ever want, you also get access to a root shell and IDE in your browser.

    Poništi
  15. 18. sij

    This could be interesting: I just found that on my O'Reilly Learning account, I have access to a Ubuntu shell as root. It can connect out, but can't seem to accept connections from the Internet.

    Poništi
  16. 18. sij

    FFS, why does YouTube have to show me the 'Pizza of Doom' ad EVERY SINGLE TIME? It was cool at first, now it's just annoying.

    Poništi
  17. 16. sij

    It sucks that so many people have starred and forked my Internal Pentest Playbook on Github, but nobody has submitted a pull request to contribute and help me make it better.

    Poništi
  18. 14. sij
    Poništi
  19. proslijedio/la je Tweet
    11. sij

    Before I speak at a conference, I always talk to the audience first. You might call it "crowd work." Here's why I do it and why I think you should too. 1. A lot of conf's give you 10-15 minutes between talks to get set up. For most of us that takes 4-5 minutes. 1/

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    10. sij

    I received over 1,000 emails asking about my path to the 100k month. I decided to record a video on it. This is meant to encourage and be transparent. I hope some lessons can be learned from my journey.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·