Michael R. Haag

@mrh44g

I like black coffee, cybersecurity, Linux, and encryption

Vrijeme pridruživanja: kolovoz 2012.

Tweetovi

Blokirali ste korisnika/cu @mrh44g

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mrh44g

  1. Prikvačeni tweet
    24. velj 2018.

    ALE = SLE x ARO, but if your org hasn't had a "loss" yet, which stats do you look at for ARO? ARO must be greater than zero, so...?

    Poništi
  2. proslijedio/la je Tweet

    Coming soon to Sysmon: clipboard logging for malicious RDP session DFIR, and shredded file recovery for capturing hacking tools

    Poništi
  3. proslijedio/la je Tweet
    4. velj

    Introduction to : so-import-pcap and data exfil

    Poništi
  4. proslijedio/la je Tweet
    25. sij

    (A few) Ops Lessons We All Learn The Hard Way -- a Twitter 🧵:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    8. sij

    The is pleased to announce the release of Wazuh 3.11 🎉. You can read about the new additions and improvements in this post:

    Poništi
  6. proslijedio/la je Tweet
    18. sij

    I’ll be speaking about all of the challenges, and the thought process behind selecting the different techniques that we wanted to highlight this year.

    Poništi
  7. proslijedio/la je Tweet
    17. sij

    ZAP 2.9.0 is now available from For full details see the release notes: Thank you to everyone who has contributed to this release.

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    Okay here it is, Zipper a new file and folder compression utility for CobaltStrike. Blue Teams/Hunters/Defenders: Lookout for non file-compression related processes creating (random named) zipfiles within temp folders.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    13. sij

    PacketFence v9.3 is out! Massive GUI performance improvements and see what's coming up in v10! See for details.

    Poništi
  10. proslijedio/la je Tweet
    10. sij

    Recently I was on a pentest and needed to manage Active Directory groups from Linux to achieve privilege escalation. If you find yourself in a similar scenario, this is what you can do:

    Poništi
  11. proslijedio/la je Tweet
    5. sij

    is fun for the whole family. Share the challenge before it closes on January 13:

    Poništi
  12. proslijedio/la je Tweet
    31. pro 2019.

    Storytelling is the key. 🔑 applies a new spin on social engineering + shares tips for leveling up our work in 2020:

    Poništi
  13. proslijedio/la je Tweet

    Old trick my pops showed me for creating a screw placement template when using wall mount holes on electronics Inb4 “Dude who doesn’t know that?”

    Poništi
  14. proslijedio/la je Tweet
    29. pro 2019.

    Artillery v2.3 released due to some incredible work from . Way too many things to mention as far as features, improvements, and additions. (Fixed link)

    Poništi
  15. proslijedio/la je Tweet
    24. pro 2019.
    Poništi
  16. proslijedio/la je Tweet

    Twitter is mental. I brain dump stuff, and I get subject matter experts reply. Even, literally the person who wrote the book replies. Fucking awesome.

    Poništi
  17. proslijedio/la je Tweet
    21. pro 2019.

    Today I learned that the Dutch have a dam called Asdfghjk.

    Poništi
  18. proslijedio/la je Tweet
    17. pro 2019.

    Here is a 25fps 'movie' played on an unmodded c64 via my cartridge. Music 'Winter Bird' by DRAX. 1500 frames, 32MB ! 😅

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    7. pro 2019.

    Niice. Command line version of Cyber Chef 👨‍🍳 👩‍🍳 chepy/README.md at master · securisec/chepy · GitHub

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    7. pro 2019.

    SIEMonster has been around for a few years using the Elastic Stack and Kafka, they are getting better and better, now adding Wazuh, NiFi, Suricata and The Hive, a MONSTER effort at creating a threat hunting ecosystem as a code!

    Poništi
  21. proslijedio/la je Tweet
    3. pro 2019.

    I was today years old when I learnt that you can run ELF using ld-linux. Useful when the executable bit is not set (and you can't change it).

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·