—(÷[ Nate Warfield   BlueHat IL ]÷)—

@n0x08

I do threat intel & manage Windows/Azure/Hyper-V vulns for Microsoft (MSRC). I research IoT & clouds, speak @ cons. DnB DJ, snowboarder, dad. Keybase:n0x08

Woodinville, WA
Vrijeme pridruživanja: travanj 2016.

Tweetovi

Blokirali ste korisnika/cu @n0x08

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @n0x08

  1. Prikvačeni tweet

    There’s been a lot of media coverage about but here’s food for thought: RDP exposure is nearly 3x that of SMB & 100% are running Windows. If you’re not taking steps to protect your network you need to start NOW. I’m not aware of any active exploitation /2

    Prikaži ovu nit
    Poništi
  2. And I looked, and behold a pale horse: and his name that sat on him was Death, and Hell followed with him.

    Poništi
  3. I'm thrilled to announce I'll be coming back to again this year! I'll be speaking about using tools like & to track malicious activity and find the holes in your network before attackers do. See you in April! 😎

    Poništi
  4. Poništi
  5. I always enjoy reading how people use OSINT to catch scammers & this is an excellent example. Nice job I'm looking forward to more!

    Poništi
  6. Like gaming? Want to help protect millions of Xbox users? Cool, so do we, and we'll pay you up to $20k for qualifying vulnerabilities 😎

    Poništi
  7. - what a cool project. Especially for those of us with a few nRF52840 dongles laying around 😁

    Poništi
  8. Poništi
  9. and special thanks to for this most perfectly timed retweet 🤣

    Prikaži ovu nit
    Poništi
  10. Whomever decided to name it "CacheOut" instead of "Cache(me)OutSide(channel)" really missed a marketing opportunity 😂

    Prikaži ovu nit
    Poništi
  11. Achievement unlocked: successfully used Teams audio feedback loop to make the meeting hear “oonce oonce oonce” in a loop. Confirmed by remote attendee noting they could ‘hear the EDM’ 🤣

    Poništi
  12. If you're running a honeypot this thread is worth reading. Attackers utilize some interested techniques to avoid getting caught; learn from their failures to help understand what a 'sensor discovery attack' looks like. Great job by catching & explaining it!

    Poništi
  13. Poništi
  14. Heh. Reminds me of a problem I worked years ago. Due to some design decision, this proprietary HW device would internally change the packet flow when interfaces went into promiscuous mode. Running tcpdump made the problem stop. CTRL+C and it came back. 🤯🤬

    Poništi
  15. We updated the Security Servicing Criteria for Windows today clarifying a non-boundary (Hyper-V Administrator Group) & expanding the Administrator-to-Kernel non-boundary. We do this periodically in response to research trends; feedback is always welcome.

    Poništi
  16. In case there was any doubt around the urgency in patching or restricting access to RD Gateway.. - has started scanning UDP/3391 - correlating which hits are RDG isn't difficult.

    Poništi
  17. The raw data feature is invaluable for enumerating endpoints & finding vendor equipment. I’ll be talking about this & other tricks next month at and a deep-dive during in March 😎

    Poništi
  18. Add yet another item to the myriad of reasons I respect - this is giving back to the community at it's finest! 👍

    Poništi
  19. I'd like to extend a big thank you to for reporting this to MSRC and working closely with us to fix the misconfiguration! - the official MSRC statement about this issue.

    Poništi
  20. Ok this is the coolest ad campaign I've ever seen.

    Poništi
  21. Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·