Chris Campbell

@obscuresec

Red Team Chief at [redacted]. Obscure security researcher. My handle flags bad AV. Attacker emulation, , sec, father of a bunch and Army Vet

krbtgt, $env:USERDNSDOMAIN
Vrijeme pridruživanja: studeni 2011.

Tweetovi

Blokirali ste korisnika/cu @obscuresec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @obscuresec

  1. Prikvačeni tweet
    9. ruj 2019.

    What data do we have to support the hypothesis that the free release of open source Red Team tools has improved the overall security posture of the internet?

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    5. velj

    Every time your CTO mentions AI the best thing to do is spray them directly in the face with a spray bottle filled with room temp water. This may startle them, but it does not hurt them and will curb the behavior.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    29. sij

    Great, now skidz and APT alike are going to be able to freeload off of more OffSec tooling to create amazing documentation and report-outs.

    Poništi
  4. proslijedio/la je Tweet
    22. sij

    So proud to see our PowerShell class released to the public for free. There may be some tradecraft in there FYI that might not be broadly covered. Enjoy!

    Poništi
  5. proslijedio/la je Tweet
    15. sij

    If you’re on an internal Red Team that’s struggling to build trust with leadership and defenders, NOW is a great time to pause your op and go help out. Your perspective and mindset will complement their own, and and help quell fear of the unknown. Go help.

    Poništi
  6. proslijedio/la je Tweet
    9. sij

    I may not have many followers, but if anyone knows someone who needs an IT veteran with 20 years’ experience, who learned Cisco when telnetting to a switch was not a security risk, and who has a CISSP, SSCP, and several other certs, my DMs are open.

    Poništi
  7. proslijedio/la je Tweet
    7. sij

    The benefit to security of any disclosure policy tends to be inversely proportional to how loudly vendors cheer for it 🤣

    Poništi
  8. proslijedio/la je Tweet
    24. pro 2019.

    releasing offensive tools without drama

    Poništi
  9. proslijedio/la je Tweet
    14. stu 2019.

    Ransomware is often talked about with the same ‘superpower’ and malware focused narrative APTs are. Both are humans usually using psexec, GPOs, and stolen credentials to move laterally and deploy malware. Mitigations exist and networks can be hardened:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    12. stu 2019.

    People always ask, "When are you hiring for those full scope jobs we hear about in talks." Whelp, today is the day. Check out my latest article: FULL SCOPE RED TEAM OPERATOR WANTED

    Poništi
  11. proslijedio/la je Tweet
    7. stu 2019.

    just heard someone say "at least if i die and go to hell i won't have to look at javascript again". lmao where do you think javascript came from

    Poništi
  12. proslijedio/la je Tweet
    29. lis 2019.

    My company has opportunities to sponsor penetration testers for high level U.S. government clearances. Great benefits. Contact me at rweiss@warcollar.com if you are interested.

    Poništi
  13. proslijedio/la je Tweet
    28. lis 2019.

    Just released Recon-ng v5.1.0! Huge feature update. Dockerized everything, added the ability to leave notes for rows, and added the Recon-API! Fully featured with the ability to run modules as background tasks. Plus more. See the commit log. Also, updated the wiki!

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    8. lis 2019.

    Windows Error Reporting privilege escalation (CVE-2019-1315) Fixed in October updates

    Poništi
  15. proslijedio/la je Tweet

    We live in a world where we need software to protect software from software.

    Poništi
  16. proslijedio/la je Tweet
    26. ruj 2019.

    Infosec was liberated upon the acceptance of an assume breach mindset. More dangerous than the notion of attackers targeting you is that of complacency, over-confidence, and fear of change.

    Poništi
  17. proslijedio/la je Tweet
    26. ruj 2019.

    Dear technology executives (especially CTOs): Your presence in incident chat rooms or on A/V bridges *absolutely* influences the response to the incident. This influence is rarely positive and only increases as the incident unfolds. Do with this information what you will. 🙂

    Poništi
  18. 26. ruj 2019.

    In late 2019, there are still people in the security industry who equate patching to security. As in, "as long as we patch, we won't be compromised."

    Poništi
  19. proslijedio/la je Tweet
    25. ruj 2019.

    And so it begins... The ShmooCon Call for Papers is open!

    Poništi
  20. proslijedio/la je Tweet
    24. ruj 2019.

    GHIDRA 9.1 is out! release notes:

    Poništi
  21. proslijedio/la je Tweet
    23. ruj 2019.

    is rsa cracked or not

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·