Tweetovi

Blokirali ste korisnika/cu @williballenthin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @williballenthin

  1. proslijedio/la je Tweet
    24. sij

    1/ Here's a thread on how to build the kind of security artifact "social network" graph popularized by and others, but customized, and on your own private security data. Consider the following graph, where the nodes are malware samples:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    22. sij

    The team didn't reserve indicators associated with targeted actors in the production of this scanner. Some of the things included in this scanner are widespread, and others are so incredibly rare we only saw them affecting a single customer out of the thousands we support.

    Prikaži ovu nit
    Poništi
  3. 17. sij

    In which we discuss an actor deploying a mitigation for the Citrix vuln, but also appearing to have a backdoor.

    Poništi
  4. 16. sij

    * not guaranteed to be a selfless action

    Prikaži ovu nit
    Poništi
  5. 16. sij

    ROFL at the internet white knight that's dropping payloads to inoculate Netscaler devices.

    Prikaži ovu nit
    Poništi
  6. 13. sij
    Poništi
  7. 10. sij

    Here's my first set of notes collected while learning to do Binary Analysis in Python3.

    Poništi
  8. 3. sij

    Even Go code starts to look like BNF language definitions. See below. This makes it feasible to rapidly develop query languages or DSLs for specific tasks. Glad I don't have to stuff everything into YAML or inline Python.

    Prikaži ovu nit
    Poništi
  9. 3. sij

    In college, I came to understand that parsing (source code, structured text, etc.) was difficult. Yacc & Bison didn't seem easy to use. These days, I've learned there are easy and powerful solutions: things like Nom (Rust) or Parsec (Haskell).

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    26. pro 2019.

    Any ideas for Masters/Bachelors thesis topics around malware analysis, reverse engineering, low-level security or other infosec topics? Please RT too - I get this question a lot and I always struggle to answer. So I hope to use our community's wisdom and send folks here :)

    Poništi
  11. 20. pro 2019.

    have you ever wished to have interactive buttons in your IDA Pro comments?

    Poništi
  12. 6. pro 2019.

    Building an app this week that has: Lua extension points to a Go program compiled into WebAssembly that loads from TypeScript compiled into JavaScript. And somehow it works awesomely.

    Poništi
  13. 1. pro 2019.

    By configuring CD with GH Actions then it should be easy to push new content, even via the GH new page editor!

    Prikaži ovu nit
    Poništi
  14. 1. pro 2019.

    Updated the ol' website to use Hugo (instead of Jekyll).

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    24. stu 2019.

    Can confirm this! Just found APT evil in this file last week. 🙌🏻 It was like finding money in your pocket after putting your winter coat on for the first time since last year. ConsoleHost_history.txt for the win.

    Poništi
  16. 22. stu 2019.
    Prikaži ovu nit
    Poništi
  17. 22. stu 2019.

    Parse Transactional Registry logs in 010 Editor using this template: Windows Scheduled Tasks uses the Transactional Registry to record tasks, so you can feasibly recover deleted tasks. Used this to find APT28 lateral movement last week.

    Prikaži ovu nit
    Poništi
  18. 22. stu 2019.

    me: "I want to get the Cybertruck" wife: "We can talk about this later"

    Poništi
  19. 21. stu 2019.
    Poništi
  20. proslijedio/la je Tweet
    16. stu 2019.

    This is an amazingly detailed work, and I am sure even many of those who solved this task can learn something new:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·