plug

@plugxor

Your atypical security enthusiast

Vrijeme pridruživanja: siječanj 2013.

Tweetovi

Blokirali ste korisnika/cu @plugxor

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @plugxor

  1. proslijedio/la je Tweet
    30. sij

    Heading to ? In the job market? Come chat with me at

    Poništi
  2. 21. sij

    Over the weekend I took a nice break from using any handheld device unless absolutely necessary to enjoy some quality family time. I’ve been using this self imposed rule for a few months. Give it a try, is a fantastic way to recharge.

    Poništi
  3. 17. sij

    Do you like to think outside box? Want to explore new exploitation ideas? Would like to work in the company of amazing individuals? Looking for a new gig in a red team? Then, this is a great opportunity for you, apply an join red team!

    Poništi
  4. proslijedio/la je Tweet
    6. pro 2019.

    Trying to give back a little to the community. Are you in Mexico and looking for a job in infosec? DM me!

    Prikaži ovu nit
    Poništi
  5. 5. pro 2019.

    Got a few gifts for some awesome individuals. If you do any work with Apple *OS, these books are a must. Get them now and gift the knowledge this holidays. Thanks for all the knowledge!

    Poništi
  6. 4. pro 2019.

    Don’t miss out, btw, they still have CFP open, go!

    Poništi
  7. 3. pro 2019.
    Poništi
  8. 29. stu 2019.

    Thank for the kind words and feedback. More macOS/Linux Threat Hunting soon. Also, the deck and talk was also possible by work, thanks bud, you rock!

    Poništi
  9. 25. stu 2019.

    Ben is on point, not only that, but many organizations are using it as a defense UNICORN, it is NOT. However, is a great framework to drive and enhance your security program. The team is awesome, & are working with the community on making the framework even better.

    Poništi
  10. 25. stu 2019.

    Here is the deck for the presentation done this year, I hope is of use to any of you. Feel free to provide feedback, DMs always open.Also, I plugged you in a section, thanks for all you awesome work. Enjoy:

    Poništi
  11. 5. stu 2019.

    Sadly won’t make it to this year, but look how awesome the event is going to be: . Without a doubt one of my favorite conferences of all time!

    Poništi
  12. 30. lis 2019.

    But if this what you think of purple, you are either probably doing it wrong or at least, starting with the incorrect mindset. In which case, the issue is likely on the interaction of red/blue, and purple won’t solve that. 2/2

    Prikaži ovu nit
    Poništi
  13. 30. lis 2019.

    Unpopular take, IMHO “Purple teaming is red teaming done right” is incorrect & the wrong take. Purple should be a complement of your security strategy. I’m a bit spoiled since we have an amazing Red Team, & will be the benchmark in which I may measure others. 1/2

    Prikaži ovu nit
    Poništi
  14. 30. lis 2019.

    Explore, try & repeat, until you find the sweet spot. The sub-techniques changes are very welcomed & should help individuals get started with the framework based on their user cases/needs. Congrats to all speakers, props to and for a great event!4/4

    Prikaži ovu nit
    Poništi
  15. 30. lis 2019.

    However, we have to do a better job in splitting the use cases and avoid a “one model fits all”, or as pointed out by , is not a unicorn! With that said, there isn’t a right or wrong approach. Find out what work for you and your org 3/4

    Prikaži ovu nit
    Poništi
  16. 30. lis 2019.

    Purple: [test cases/adversary emulation] Red: [Pushing the boundaries, finding new things to attack that lack current coverage] CTI: [aligning Intel to the framework, mapping actors activity to TTPs,etc] Other: [AI/ML]. 2/4

    Prikaži ovu nit
    Poništi
  17. 30. lis 2019.

    take away: we are using the framework for multiple things/reasons: Threat Hunting [create analytics, visibility gaps, finding evil], Detection: [creating/improving detections, Documenting new attacks to create new detections, Detection validation] 1/4

    Prikaži ovu nit
    Poništi
  18. 15. lis 2019.

    So, I got super busy and did not purchase a ticket. If anyone has a spare that would like to sell or know someone, please let me know. TIA!

    Poništi
  19. 3. lis 2019.

    Woot, do you enjoy puzzles? Like taking things apart? Want to work with an Amazing group of individuals in Offensive Security? Look no more and go apply, like now!!!

    Poništi
  20. 3. lis 2019.

    I was talking with how easy is to bypass many detections/EDRs, just by copying and/or renaming a file. So he did some tests with Sysmon, as he points out the trick works; however, hunters should look at data in other fields to make more rebuts detections.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·