Jason Allen

@theGodKilla

purple teamer wannabe

Vrijeme pridruživanja: prosinac 2016.

Tweetovi

Blokirali ste korisnika/cu @theGodKilla

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @theGodKilla

  1. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  4. proslijedio/la je Tweet
    26. sij
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  7. proslijedio/la je Tweet
    7. ruj 2019.
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    14. sij

    BlueTeam CheatSheet * CVE-2020-0601 * crypto32.dll (Expect updates any time of the day, enjoy your first 2020 PT 😎👌 ) ↘️

    Poništi
  10. proslijedio/la je Tweet
    13. sij

    CVE-2019-19781 post-exploitation notes: If you are seeing attackers reading your /flash/nsconfig/ns.conf file then you need to change all passwords. The SHA512 passwords are easily crackable with hashcat.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    16. pro 2019.

    Looking for a python challenge over the holiday break? Here is my python CTF challenge that can be solved more than one way:

    Poništi
  12. proslijedio/la je Tweet
    9. sij
    Poništi
  13. proslijedio/la je Tweet
    9. sij

    Spray-AD, a new Kerberos password spraying tool for Cobalt Strike that might come in handy when assessing Active Directory environments for weak passwords (generates event IDs 4771 instead of 4625).

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    24. pro 2019.

    A lot of mud slinging on InfoSec twitter lately; I wanted to flip the script a bit and highlight the blogs, tools, talks etc that I keep coming back to on a regular basis, both as a defender and general InfoSec professional. Thread..

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    30. pro 2019.

    I have published a blog post: "Active Directory Security Fundamentals" - It contains a PDF with hands-on recommendations that you use to secure AD.

    Poništi
  16. proslijedio/la je Tweet
    3. sij

    The offensive security community means a lot to me. Following 's great thread that injected some much needed infosec positivity, I wanted to highlight a few (offensive-ish) posts/talks that my team and myself enjoyed over the last year or so.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    2. sij

    To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. h/t

    Poništi
  18. proslijedio/la je Tweet

    How to prepare a dll to be loaded into LSASS with protection mode? -Get an EV Code signing cert (300$) -Open a MS partner account -add the "hardware" program -go to "file signing service" - prepare a cab containing the dll - sign the cab with your cert - submit and wait 1 hour

    Poništi
  19. proslijedio/la je Tweet
    19. pro 2019.

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Poništi
  20. proslijedio/la je Tweet
    18. pro 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·