Tweetovi

Blokirali ste korisnika/cu @timb_machine

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @timb_machine

  1. proslijedio/la je Tweet
    2. velj

    Got something to say! Want to talk about your latest project, discovery, idea? The call for presentations is OPEN. For more information Pls RT

    Poništi
  2. 31. sij
    Poništi
  3. 30. sij

    while (!@openvas) { sleep(INT_MAX); } return ; # Eventually loops return... For those of you familiar with OpenVAS's history, we are currently evaluating it for a training project which makes me quite excited

    Poništi
  4. 27. sij

    123 out of 223 propositions were qualitative in my initial non-peer reviewed analysis.

    Prikaži ovu nit
    Poništi
  5. 27. sij

    Based on generous marking and some quick analysis, 61% of qualitative predictions from Infosec community might be considered accurate for 2019.

    Prikaži ovu nit
    Poništi
  6. 27. sij

    Based on 2019 analysis, I am predicting year on year growth in crappy predictions in cyber for 2020. Science it is not.

    Prikaži ovu nit
    Poništi
  7. 27. sij

    Might be time to see how many of these were correct...

    Prikaži ovu nit
    Poništi
  8. 27. sij

    open($trolls, "<" . $twitter); # Back online after a nice break ;)

    Poništi
  9. proslijedio/la je Tweet
    18. sij

    Woop. 's hash cracking work for AD on UNIX is in JtR jumbo :)

    Poništi
  10. proslijedio/la je Tweet
    31. pro 2019.

    SSH came in at number 16 and NTP at 20 this time out. Bumping them down, VNC and some of the newer Windows management ports...

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. pro 2019.

    Interesting to compare changing stats from assessments each year. This year the top 5 ports seen were, perhaps unsurprisingly HTTPS, HTTP, SMB, RDP, NetBIOS SSN. Last year it was HTTPS, NTP, SSH, HTTPS and *oddly* SCOM.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    11. sij

    Threat Crank... allows you to selectively walk based on industry sector, geographic location and platform and produce both text reports and directed graph data for . This graph is combined attack tree of all actors whose attacks reference AWS:

    Poništi
  13. proslijedio/la je Tweet
    17. sij
    Odgovor korisniku/ci

    We've long been known as Team Alpaca ;)

    Poništi
  14. proslijedio/la je Tweet
    19. sij

    In which we went through some of our approaches to threat hunting on UNIX. Might be some more tips today...

    Poništi
  15. proslijedio/la je Tweet
    20. sij

    Always a happy day, when you hit crontab -e up to add some new TI to the mix! Threat crank in full ATT&CK report and digest modes... Currently debating an auto-responder for war game mode \o/

    Poništi
  16. proslijedio/la je Tweet
    23. sij

    Rumours have it that /@portculllislabs' is hanging out at the SOC with the folks playing the bad guy and helping demonstrate how StealthWatch gives N/S and E/W visibility \o/

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    23. sij

    Interesting paper, irrespective of your position on the recommendations. Figures at end for CMA prosecutions alone make interesting reading.

    Poništi
  18. proslijedio/la je Tweet
    24. sij

    Our friends at are looking for an incident commander in North America:

    Poništi
  19. proslijedio/la je Tweet
    24. sij
    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    There's a box 🔲 If you put a cross in it, you'll save our NHS, properly fund our schools and tackle the climate emergency. You'll end the housing crisis and poverty. But billionaires and multi-millionaires will have to pay their fair share. Do you cross that box?

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·