Rémi Escourrou

@remiescourrou

Information security enthusiast, I work as penetration tester & I am passionate about windows security and active directory

Paris, France
Vrijeme pridruživanja: kolovoz 2016.

Tweetovi

Blokirali ste korisnika/cu @remiescourrou

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @remiescourrou

  1. Prikvačeni tweet
    7. kol 2019.

    We decided to share the content of our Active Directory Security workshop at : enjoy and have fun with AD 😊

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  3. proslijedio/la je Tweet
    31. sij
    Poništi
  4. 31. sij
    Prikaži ovu nit
    Poništi
  5. 31. sij

    Computer owner could be a real issue in MS environment, I cover in my last blog post a way to perform privilege escalation in AD thanks to PXE and LAPS

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    1. sij

    ░░░░░░░░░░░░░░░ 0%

    Poništi
  9. 18. pro 2019.

    What a fun day ! Come back to my engineering school to teach Windows Cybersecurity, a bit of Windows+L awareness during the break 😰 and a nice blue screen at the airport !

    Poništi
  10. proslijedio/la je Tweet
    13. pro 2019.

    🚨 Tous les chemins de la sécurité mènent à l'AD ! du jour : jetez un œil à la présentation de sur le sujet ! 👍 ➡️ Complet et accessible, c'est rare ! Tier 0, poste d'admin, gestion des secrets, détection, Azure AD... 📚

    Poništi
  11. 11. pro 2019.
    Poništi
  12. 10. pro 2019.

    First time on stage at to handle Active Directory attacks and defense, a bit nervous and excited 😜 cc

    Poništi
  13. 28. lis 2019.

    Quel plaisir d’aller donner une conférence dans sa ville de cœur , surtout pour parler de la sécurité autour de l’Active Directory, vivement décembre !

    Poništi
  14. 10. lis 2019.

    New sticker on the HyperV, ready to start the Workshop ! Can’t wait to meet new students 👌

    Poništi
  15. 4. lis 2019.

    Some fun tonight with Silenttrinity: Adding Path The Hash capability through WMI. You should definitly try this C2. Thanks for Invoke-TheHash and for C# port👍 cc

    Poništi
  16. proslijedio/la je Tweet

    Significantly mitigate information disclosure concerns in your PowerShell PSReadline history: Set-PSReadLineOption -AddToHistoryHandler { param([string]$line) $sensitive = "password|asplaintext|token|key|secret" return ($line -notmatch $sensitive) }

    Poništi
  17. proslijedio/la je Tweet
    6. ruj 2019.

    [remote] Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Remote Code Execution

    Poništi
  18. proslijedio/la je Tweet
    30. kol 2019.

    Excited to announce our Adversary Tactics: Red Team Ops course is coming to Europe! Location: Brussels, Belgium Dates: November 19th-22nd More info and sign up at:

    Poništi
  19. 29. kol 2019.

    My new favorite game is to trap someone with , really nice work by on Electron App ! You should take a look at

    Poništi
  20. proslijedio/la je Tweet
    16. kol 2019.

    I have released a guidance on how organizations can secure their Active Directory

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·