Mark

@sneakymonk3y

uber geek blue team cyber commando +father +gamer - bad guy annihilator - GC(FE/FA/IH) - | (views are my own)

Worcester, UK  
Vrijeme pridruživanja: svibanj 2008.

Tweetovi

Blokirali ste korisnika/cu @sneakymonk3y

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sneakymonk3y

  1. Prikvačeni tweet
    25. lip 2018.

    Finally got round to finishing a few on my blog - hope they help!

    Prikaži ovu nit
    Poništi
  2. 3. velj

    Quick insight into the Iranian threat actors out there, their targets and typical TTPs used. Team ⁦⁩ podcast👏 🇮🇷

    Poništi
  3. 31. sij
    Poništi
  4. 31. sij
    Poništi
  5. 30. sij
    Poništi
  6. 29. sij
    Poništi
  7. 27. sij

    Every time I boot up a console! I just want to see some FATALITIES- 1hr later...

    Poništi
  8. 27. sij

    Some nice lateral movement and persistence techniques here. Handy for to take note...

    Poništi
  9. 24. sij
    Poništi
  10. 22. sij

    "PowerShell use by attackers is not going anywhere and defenders need to know how to detect its use. This material is being released for free to facilitate detection." Thanks man.

    Poništi
  11. 21. sij
    Prikaži ovu nit
    Poništi
  12. 21. sij

    DCOM lateral movement and nursery rhymes kinda day.

    Prikaži ovu nit
    Poništi
  13. 17. sij
    Poništi
  14. proslijedio/la je Tweet
    15. sij

    Microsoft added Event ID 1 to the Application Log to show attempted exploitation of CVE-2020-0601 (via new CveEventWrite function). Use Splunk? Collect that EID and alert on: sourcetype=WinEventLog EventCode=1 LogName=Application Message="*[CVE-2020-0601]*" (tweak as needed)

    Prikaži ovu nit
    Poništi
  15. 14. sij

    Check out my colleagues awesome write up - have an upvote ⬆️ some serious time went into this!

    Prikaži ovu nit
    Poništi
  16. 14. sij

    Maybe next year! Cheers all - appreciate the work that went into this 👏

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    13. sij
    Prikaži ovu nit
    Poništi
  18. 12. sij

    Quick run down of the attack

    Prikaži ovu nit
    Poništi
  19. 12. sij

    Some good tactical responses for both detective and preventative measures in this Middle East NCSC report on the wiper malware they found

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    11. sij

    In response to the recent ADC (NetScaler) CVE-2019-19781 Remote Code Execution vulnerability, the TrustedSec IR, offensive, and research teams provide files and locations that may contain evidence of a compromise

    Poništi
  21. 10. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·