Mike Burns

@mburns7

Defend it and they will come. CISSP. CEH. Blueteam. Making tweets on a plane.

Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @mburns7

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mburns7

  1. prije 12 sati

    Had a populated framework for a new domain up and running in about 3 hours.

    Prikaži ovu nit
    Poništi
  2. prije 12 sati

    Utilized this script to populate users in a Greenfield domain after ransomware hosed the old environment. had a script that created a New AWS VPC,2 subnets and 2 Domain Controllers. 1/2

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    prije 22 sata

    Yearly reminder to remove PowerShell V2 EVERYWHERE. Doesn’t matter what EDR , logging, witchcraft you have in place. If an attacker has access to the Posh V2 runtime, they can automatically bypass it all.

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  5. 29. sij

    Forked this excellent PowerShell script to look for Insecure LDAP connections. -Added functionality to query all DCs in the environment -Added functionality to update required regkey if it is not set

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    We've all received emails with no attachment and assume it's "safe" to open in a mail client (as long as we don't explicitly click on any URLs). Right? Not so much...

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    27. sij

    , go hunt for insecure ldap connections before 03/2020 Windows Update are applied

    Poništi
  8. proslijedio/la je Tweet
    19. sij

    Download NetScaler Release (Maintenance Phase) 11.1 Build 63.15 < security fix

    Poništi
  9. proslijedio/la je Tweet
    15. sij

    :Win32/CVE-2020-0601.A The Windows version of the specified parameter ECC key certificate will be affected. So the vulnerability affects WIN10, Win Server2016 / 2019, And WIN7 does not support ECC keys with parameters. NSA:

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    This you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately.

    Poništi
  11. proslijedio/la je Tweet
    14. sij

    I really liked this line "Best of luck to all defenders working on CVE-2019-19781—we promise to be with you on the front lines in joyness and in sorrow, in Citrix and in health." in I lol'd.

    Poništi
  12. 14. sij

    Should you Cloud WAF your WAF? Would love to be a salesrep this week. Imagine them and others are getting decent inbound leads this past week.

    Poništi
  13. 13. sij
    Poništi
  14. 7. sij

    Speedy PowerShell Access to Office 365 Groups with Get-ExoRecipient

    Poništi
  15. 30. pro 2019.

    Still got to read my way through this but initial review is that this is full of excellent content!

    Poništi
  16. 22. pro 2019.

    Just noticed this PowerShell Command Explorer button in Has this always been there or I've been blind?

    Poništi
  17. proslijedio/la je Tweet

    Wawa CEO says data breach involving malware on their payment processing servers may have affected, well, all of their locations.

    Poništi
  18. 16. pro 2019.
    Prikaži ovu nit
    Poništi
  19. 16. pro 2019.

    I Imagine there is about to be a lot of new 2016 Domain Controllers being created in the next couple weeks. Is your SYSVOL replicating using DFSR?

    Prikaži ovu nit
    Poništi
  20. 12. pro 2019.

    Note to self: prime the flue

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·