Tweetovi

Blokirali ste korisnika/cu @talthemaor

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @talthemaor

  1. Prikvačeni tweet
    6. lip 2017.

    GoFetch is out! Take a attack path, a payload, and watch it spread through the network.

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Security researcher tracks down one of the REvil ransomware distributors to a Russian named "Alexander Taker"

    Poništi
  4. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  5. proslijedio/la je Tweet
    22. sij

    If you're playing with Kerberos and want to view the encrypted parts in Wireshark you can do so with a keytab file. Since impacket was missing structures for this I added a script to my forest trust tools repo which easily allows adding multiple keys:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    22. sij

    SharpRDP, a .NET console application that can be used to perform authenticated command execution against a remote target for the purposes of lateral movement through RDP without the need of a GUI client or SOCKS proxy. Send Win+R through RDP.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    7. sij

    1/ so great to see something we did in 2016, actually catches real bad guys in the wild in 2019 We = + others and probably on the bad guys end 😛

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    Odgovor korisniku/ci

    ATA detected it.

    Poništi
  9. proslijedio/la je Tweet
    21. lis 2019.

    In other words: Avast got pwned to Domain Admin, and they discovered it using Microsoft Advanced Threat Analytics

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    Passwords are terrible. Your password is already out there as a result of some data breach. And if it’s not, it will be. Or you will be phished. It’s only a matter of time. Turn on MFA!

    Poništi
  11. 18. ruj 2019.
    Poništi
  12. proslijedio/la je Tweet
    9. ruj 2019.

    In late July, Microsoft reduced false positives of the Medium risk event "Unfamiliar Sign-in Properties" in , by also including EAS clientID and automatically detecting corporate IP addresses based on traffic pattern. Did it help? You tell me :-)

    Poništi
  13. proslijedio/la je Tweet
    29. kol 2019.
    Poništi
  14. proslijedio/la je Tweet
    2. kol 2019.

    I’m very excited to share that Covenant v0.3 is out today! Includes a brand new web-based interface. Blog below with details 🙂 [blog] Covenant: The Usability Update

    Poništi
  15. proslijedio/la je Tweet

    We’re pleased to announce the general availability of our new identity threat investigation experience, which correlates identity events from , and into a single investigation experience for security analysts and hunters alike

    Poništi
  16. proslijedio/la je Tweet
    30. lip 2019.

    Thanks to those who attended my Windows WPP and TraceLogging talk at ! As promised, here are my slides. Additional references are in the last few slides. If you have any follow-on questions, ask away!

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    1. srp 2019.

    Interested in a deep dive on Azure Advanced Threat Protection? Check out our upcoming webinar. Details and registration at . It will be a follow-up on Detections and will take place on Monday, July 15th at 8:00 AM PT / 11:00 AM ET / 15:00 UTC.

    Poništi
  18. proslijedio/la je Tweet

    The unified Identity Threat Investigation experience between Azure Active Directory (Azure AD) Identity Protection, Azure Advanced Threat Protection (ATP), and Microsoft Cloud App Security goes public preview this month!

    Poništi
  19. proslijedio/la je Tweet
    24. lip 2019.

    I wrote a small scanner utility to check if systems are vulnerable to CVE-2019-1040, the NTLM Mic vulnerability that allows for Active Directory takeover. Published here:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    24. lip 2019.

    One of the most exciting talks today : ReDTunnel by & While DNS Rebinding is an old concept, a tool (only JS on client) that creates a stable generic HTTP(S) tunnel into the internal network of the victim can be a game changer

    Poništi
  21. proslijedio/la je Tweet
    17. lip 2019.

    Blog about msticpy - One library that every defender should know about featuring various modules for security analysts - base64unpack, iocextract, vtlookup, geoip, eventcluster, outliers, auditextract and more to do with

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·