Tweets
- Tweets, current page.
- Tweets & replies
- Media
You blocked @tifkin_
Are you sure you want to view these Tweets? Viewing Tweets won't unblock @tifkin_
-
Lee Christensen Retweeted
You'll have a hard time finding a more mature methodology for developing _robust_ detections than
@cryps1s and his colleagues at@PalantirTech.https://twitter.com/cryps1s/status/943223410318041090 …Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
We've open sourced our framework for developing alerting and detection strategies for incident response. We have also included several internal strategies as examples to spur greater sharing and collaboration with defenders.https://medium.com/@palantir/alerting-and-detection-strategy-framework-52dc33722df2 …
Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
As a high school dropout, I often struggle comprehending mathematical formulas from academic papers (aka numbers combined with squiggly lines). This github just explained so much to me:https://github.com/Jam3/math-as-code …
Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
Girl Scouts will soon earn badges in cybersecurity https://www.huffingtonpost.com/entry/girl-scouts-cybersecurity-badges_us_594b63e0e4b0312cfb6175da … <- This is so Awesome!
Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
Where the heck has this been in twitter feeds? Microsoft added a ton of information for Windows Events on Github. Its not everything, "yet?", as only 9 days ago for the commit... but wow, great resource.. git clone to your box :)https://github.com/MicrosoftDocs/windows-itpro-docs/tree/master/windows/device-security/auditing …
Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
Women in cybersecurity programs - apply for this new scholarship! Open to cybersec students (US or Israel citizens). More info here from Morphisec: https://www.morphisec.com/Newsroom/morphisec-launches-women-cybersecurity-scholarship-program/ …
@WiCySconference@morphisecThanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI:https://aka.ms/WEFFLES
Show this threadThanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
A defender's auditing tool is an attacker's "living off the land" reconnaissance tool. For example, an attacker might be wise to run autoruns to identify existing ASEPs to hide in or hijack. There might even be privesc potential.
Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
As a red teamer, if you ever have the opportunity to work a threat hunting or IR engagement, you should jump at the opportunity! You will be humbled by the challenges defenders deal with at scale and you will gain valuable insight into how they baseline normal and triage alerts.
Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
I'm not a hash/password cracker, but some of you are. For the love of
@tifkin_ ,@harmj0y and@hashcat ,#mimikatz can now patch LSASS to force NTLM Server challenge to 0x1122334455667788 https://github.com/gentilkiwi/mimikatz/releases … (still experimental: W7-SP1 and W10-1709 only at this time)pic.twitter.com/qtPn0ySXwaThanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
Memory Map Viewer including protected processes and actual data: https://github.com/zodiacon/KernelExplorer/releases/tag/memmapview-0.1-beta …pic.twitter.com/z141sPbfjr
Thanks. Twitter will use this to make your timeline better. Undo -
Symon rules for individual ATT&CK techniques. Very cool! Excited to see the list keep growing!https://github.com/Cyb3rWard0g/ThreatHunter-Playbook/tree/master/attack_matrix/windows/sysmon_configs …
Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
Atomic Sysmon configs individually mapped to the ATT&CK Matrix anyone? https://github.com/Cyb3rWard0g/ThreatHunter-Playbook/tree/master/attack_matrix/windows/sysmon_configs …
@Cyb3rWard0g is on fire! All this now requires is a little code to enable selective merging of technique detections. Detection unit testing FTW!#DFIR /cc@subTeeThanks. Twitter will use this to make your timeline better. Undo -
It is still common to see some Windows XP or Windows 2003 machines in the environments I work in.
Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
Vulnerability Walkthrough: 7zip CVE-2016-2334 HFS+ Code Execution Vulnerability http://dlvr.it/Q3fldN pic.twitter.com/AsQftsfBG0
Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
CALDERA has been released! https://github.com/mitre/caldera We will be presenting the work at
#BHEU next week.#adversaryemulation#mitrecorpThanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
Myself and
@L0C4RD took a look at the Furby Connect's BLE-uploadable DLC formathttps://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect …Show this threadThanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
Logging like a lumberjack - how to best configure your systems and tools-of-the-trade to semi-automate logging: http://okt.to/G56MnH pic.twitter.com/FDOKDtKI1G
Thanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
SoMeta Automates Enumeration of the AWS EC2 Metadata Service so you can spend more time doing what you love rather than repeatedly curl-ing REST APIs by hand. https://Stage2Sec.com/blog/2017/11/13/automating-aws-ec2-metadata-service-enumeration …
#Security#infosec#AWS#Cloud#Pentesting#pentest#RedTeampic.twitter.com/jIOsU8bb4rThanks. Twitter will use this to make your timeline better. Undo -
Lee Christensen Retweeted
The fourth post in my "PowerView PowerUsage" series https://posts.specterops.io/the-powerview-powerusage-series-4-e8d408c15c95 … - covers enumerating cross-trust DACLs/ACEs
Thanks. Twitter will use this to make your timeline better. Undo
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.