tomchop

@tomchop_

Digital Forensics & Incident Response by day; threat intel and malware analysis by night. alumn. (views are my own) he/him

Zurich, Switzerland
Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @tomchop_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tomchop_

  1. Prikvačeni tweet
    13. kol 2019.

    I rewrote unxor in ! Plaintext attacks on multi-byte XOR keys have just become (slightly) faster 😎 $ go get In the process, I also learned about: ✅ Single-use Docker containers ✅ Golang tests & Travis CI ✅ Asciinema demos

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    À tous ceux qui rêvent de au . Les *pré-requis* : - aucun shadow-IT - tous les comptes utilisateurs connus & validés - tous les systèmes systématiquement patchés - tous les flux chiffrés & authentifiés - une équipe de dev de proxy protocolaires Bon courage !😊

    Poništi
  3. 26. sij

    I know my code isn’t the best quality but jeez this is harsh 🤣

    Poništi
  4. 19. sij

    Pinging and who might be able to help, or know someone who could :) Thanks ❤️

    Prikaži ovu nit
    Poništi
  5. 19. sij
    Prikaži ovu nit
    Poništi
  6. 19. sij

    Hey STIX nerds :) I am trying to fetch a bundle from one of 's collections (Enterprise ATT&CK), but it seems one of the SROs is referencing a target that is not included in the bundle (it *is* included, however, in the Enterprise Mobile collection) Is this WAI?

    Prikaži ovu nit
    Poništi
  7. 17. sij
    Poništi
  8. proslijedio/la je Tweet

    CVE-2019-19781 Shitrix CVE-2020-0601 Crypt32.dll CVE-2020-2551 Weblogic remote exec Sending thoughts and prayers to every IT & Sec Ops out there…

    Poništi
  9. 16. sij

    All you need to enroll in Google’s Advanced Protection Program is an Android phone or, as of today, an iPhone. Do it now if you think you could be a target!

    Poništi
  10. 16. sij
    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. 6. sij

    There's probably a shitton of CVEs in the code I've written, but I haven't found any of them yet ¯\_(ツ)_/¯

    Poništi
  13. 4. sij
    Poništi
  14. 3. sij

    Twitter is such a good knowledge sharing platform.

    Poništi
  15. proslijedio/la je Tweet
    2. sij

    Since I'm doing this on , let's start with tweet URLs. 2: Each tweet has a unique ID called a snowflake ❄️ and contains a timestamp. We can extract this timestamp to find when the tweet was sent: 🔗 🔗

    Poništi
  16. 29. pro 2019.

    This is basically why doing DFIR feels like.

    Poništi
  17. proslijedio/la je Tweet

    Wondering whether it’s occurred to the “you should be working 60+ hour work weeks” bootlickers that this mentality directly links to the dumpster fire that is the tech industry. Working reasonable hours and knowing when it’s time to tap out are a part of building GOOD tech.

    Prikaži ovu nit
    Poništi
  18. 22. pro 2019.

    Orienté DFIR: forensicator = informaticien légiste The Sleuthkit = la boite à outils du limier log2timeline = journal4fresquetemporelle grep = grèppe python = putain

    Poništi
  19. 21. pro 2019.

    Also, it seems that changed licenses from AGPL to Apache 5 days ago. Great move, as this will make it usable by many more people and organizations! 👍🏻

    Poništi
  20. proslijedio/la je Tweet
    20. pro 2019.

    The present everyone has been asking for is here! We are excited to announce the beta release of TRAM, a tool to aid in mapping reports to ATT&CK. You can find our latest blog with all the details at and the source code at .

    Poništi
  21. 20. pro 2019.

    Does this chart basically mean is losing the battle? 🤔

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·