Sam Fitzpatrick

@stfitzzz

InfoSec 🗝 | RedTeam ❤️ | Women in Tech 👩‍💻

Vrijeme pridruživanja: lipanj 2016.

Tweetovi

Blokirali ste korisnika/cu @stfitzzz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @stfitzzz

  1. proslijedio/la je Tweet

    wow i just learned a thing about metasploit by accident that I wish I could go back and teach myself like ten years ago. i could have saved myself a collective year of typing and tab completion.

    Poništi
  2. proslijedio/la je Tweet
    27. sij
    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  4. proslijedio/la je Tweet
    16. sij

    New tool coming soon... Zipper, a CobaltStrike tool written in C which allows you to compress files and folders from local and UNC paths. Useful for RedTeams when large files/folders need to be exfiltrated.

    Poništi
  5. proslijedio/la je Tweet
    15. sij
    Poništi
  6. proslijedio/la je Tweet
    5. pro 2019.
    Poništi
  7. proslijedio/la je Tweet

    You know what time it is right ??? !!! It’s the weekend after Thanksgiving which means it’s free reign of unlimited Christmas music, memes, trees and the holiday spirit!!!

    Poništi
  8. proslijedio/la je Tweet
    13. ruj 2019.

    The following paths within %windir% are writable by any user. Now you know. Security descriptor auditing is valuable.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    12. ruj 2019.

    Red Team engagements rarely end at DA. The ones that don't require you to pivot and compromise specific users in the domain. SharpSniper query's event logs, to find those users' logon IP addresses

    Poništi
  10. proslijedio/la je Tweet
    8. ruj 2019.
    Poništi
  11. proslijedio/la je Tweet
    7. ruj 2019.
    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    7. ruj 2019.

    I found this interesting using and Sysmon. Running SharpHound.exe via execute-assembly in cobalt strike, yields two DNS lookups for each host. First executable being windows defender. The second being the beacon spawn_to process. More to come in my upcoming blog post.

    Poništi
  13. proslijedio/la je Tweet
    7. ruj 2019.

    The slides for my talk "Kerberoasting Revisited" are up at . Thanks to everyone who came out!

    Poništi
  14. proslijedio/la je Tweet
    6. ruj 2019.

    DON'T FUCK IT UP

    Poništi
  15. proslijedio/la je Tweet
    6. ruj 2019.

    Sysmon 10.4 has been released by this is a fantastic upgrade, go check it out! I wrote a small blog outlining the added features,

    Poništi
  16. 1. ruj 2019.

    Prepping for after recovering from

    Poništi
  17. proslijedio/la je Tweet
    29. kol 2019.

    Updated TikiLateral to use .NET WMI stuff instead of wmic on the command line.

    Poništi
  18. proslijedio/la je Tweet
    26. kol 2019.

    Infosec friends , please let me know if anyone is interested in purchasing a DerbyCon ticket at cost. A friend of mine is looking to sell his as he is unable to attend

    Poništi
  19. proslijedio/la je Tweet
    21. kol 2019.
    Poništi
  20. proslijedio/la je Tweet
    19. kol 2019.

    When you finally decide to implement the stricter network access controls and firewall rules !

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·