whiskers ๐Ÿ–ค

18.1K posts

whiskers ๐Ÿ–ค banner
whiskers ๐Ÿ–ค

whiskers ๐Ÿ–ค

@initinfosec

script kitty | chill techie with an OffSec penchant | not l337 | CRTL, OSCP, CISSP, etc. | opinions my own or from /dev/random | he/him/=^_^=

meatspace ๊ฐ€์ž…์ผ AฤŸustos 2011
2.7K ํŒ”๋กœ์ž‰7.8K ํŒ”๋กœ์›Œ
๊ณ ์ •๋œ ํŠธ์œ—
whiskers ๐Ÿ–ค
whiskers ๐Ÿ–ค@initinfosecยท
I've only followed a few names there I recognized, but hope to utilize the platform more. Me: @initinfosec" target="_blank" rel="nofollow noopener">infosec.exchange/@initinfosec (thanks @Maliciouslink for admin-ing that instance) 2/2
English
1
2
4
1.3K
whiskers ๐Ÿ–ค ๋ฆฌํŠธ์œ—ํ•จ
Nick VanGilder
Nick VanGilder@nickvangilderยท
ZXX
2
14
148
15.3K
whiskers ๐Ÿ–ค ๋ฆฌํŠธ์œ—ํ•จ
5pider
5pider@C5piderยท
there is also this list i have saved a while ago where the diff between wininet and winhttp is explained: wininet + proxy -> needs a valid domain userโ€™s token. wininet + SYSTEM -> Bad wininet + service -> bad wininet -> harder to implement verification wininet -> socks4 winhttp + service -> good winhttp + system -> good winhttp + proxy -> HTTP/1.0 proxy issues winhttp -> impersonation support winhttp -> supports kerberos ? Sources: - learn.microsoft.com/en-us/windows/โ€ฆ - cobaltstrike.com/blog/talk-to-yโ€ฆ - docs.metasploit.com/docs/using-metโ€ฆ - learn.microsoft.com/en-us/windows/โ€ฆ - learn.microsoft.com/en-us/windows/โ€ฆ
English
4
29
181
33.2K
whiskers ๐Ÿ–ค ๋ฆฌํŠธ์œ—ํ•จ
gabsmashh
gabsmashh@gabsmashhยท
i will be engaging in orange cat behavior today. no, i will not elaborate.
English
49
9
270
9.7K
whiskers ๐Ÿ–ค
whiskers ๐Ÿ–ค@initinfosecยท
created a BSky acct - we'll see how it goes. Same username as here.
English
1
0
4
222
whiskers ๐Ÿ–ค
whiskers ๐Ÿ–ค@initinfosecยท
@sailingbikeruk @fekauff @gabsmashh @bluesky curious Q - is blueSky getting adoption similar to or more than mastadon has for infosec type folks & content? I don't check Mastadon as regularly as I probably should, but adoption & activity seemed a bit stagnant. Is BlueSky any better?
English
2
0
1
18
Ian Davies.
Ian Davies.@sailingbikerukยท
@fekauff @gabsmashh This attitude is preventing people moving. @bluesky is supposed to be a place free from haters and trolls and here you are trolling and hating. I like BlueSky but this hate on twitter and those not yet moved is hugely counterproductive. Do better.
English
1
0
3
131
gabsmashh
gabsmashh@gabsmashhยท
ok, but wtf does "lightly encrypted" mean??
English
169
12
343
59.1K
whiskers ๐Ÿ–ค ๋ฆฌํŠธ์œ—ํ•จ
Sam Curry
Sam Curry@samwcyoยท
After a really long time only focused on manual web security stuff, almost everything has started to feel like a QA checklist. There are definitely people doing novel research and dropping crazy bugs, but I think a lot of the big stepping stones require people to build really in-depth stuff (like @CharlieEriksen with @WeaselJs). When people talk about burnout, I think a lot of it has to do with the fact that there really isnโ€™t a good narrative to tell yourself after becoming reasonably competent and working for a few years on the hands-on hacking part of security. Let me pick out a team of 3 people and I guarantee you that we could hack pretty much any non-hyper secured target in just a few weeks. Knowing this, itโ€™s a lot less honest to put out work like โ€œwe hacked X companyโ€ because itโ€™s surprising to no-one who actually does this stuff. Itโ€™s getting harder, sure, but itโ€™s still beating the same drum. I think the collective work of everyone in the bug bounty/pentesting game has definitely massively improved security, but as an individual you just arenโ€™t able to report enough individual vulnerabilities to feel good about the work at a sense of purpose level. For that reason, I really think the hacking-adjacent stuff is what really becomes important after being in the weeds for so long. I have really enjoyed seeing my friends start companies, big projects, or switch into roles with more responsibility. If you are feeling kind of burnt out with the everyday hacking, I think itโ€™s important to explore the alternatives. This maybe isnโ€™t super novel and it mirrors how everyone does normal job stuff, but I was stuck in this pit for a better part of this year and think maybe it could help someone. A lot of these thoughts are similar to @gf_256โ€™s Phrack article from earlier this year.
English
24
45
560
69.7K
gabsmashh
gabsmashh@gabsmashhยท
every time i go to use a hotel shower, all previous knowledge of how shower controls work instantly leaves my brain forever
English
19
1
157
6.4K
whiskers ๐Ÿ–ค ๋ฆฌํŠธ์œ—ํ•จ
gabsmashh
gabsmashh@gabsmashhยท
gabsmashh tweet media
ZXX
37
67
554
34.6K
whiskers ๐Ÿ–ค ๋ฆฌํŠธ์œ—ํ•จ
whiskers ๐Ÿ–ค ๋ฆฌํŠธ์œ—ํ•จ
Justin Elze
Justin Elze@HackingLZยท
All of the red team courses these days, I do wonder if people are being set up for failure. Itโ€™s rarely, if ever, an entry level job and continues to become more and more about development/research as the rate at which EDR and other defensive techniques iterate is much quicker than ever before. There are several routes to buying evasive tooling, implants, and other research, but that wonโ€™t completely plug the development/research gap long term.
English
21
11
256
60.3K
whiskers ๐Ÿ–ค
whiskers ๐Ÿ–ค@initinfosecยท
"The strategy required to find a great opportunity (lots of saying yes and exploring widely) is different from the strategy required to make the most of a great opportunity (lots of saying no and remaining focused)." -@JamesClear
English
0
0
0
199
whiskers ๐Ÿ–ค
whiskers ๐Ÿ–ค@initinfosecยท
"How to connect with others: Share with someone who wants to listen or listen to someone who wants to share." -@JamesClear
English
0
0
0
285
whiskers ๐Ÿ–ค ๋ฆฌํŠธ์œ—ํ•จ
chompie
chompie@chompie1337ยท
You donโ€™t FIND exploits. You build them. You FIND vulnerabilities and exploit them. As an exploit developer that has failed to exploit lots of bugs that look good, the distinction is important ๐Ÿ˜ญ
English
22
84
725
61.3K
whiskers ๐Ÿ–ค
whiskers ๐Ÿ–ค@initinfosecยท
initinfosec's #PWK / #OSCP survival tips/thoughts. Thread of tips/tricks to hopefully help in PWK/OSCP: caveat emptor: * i'm a scrub, trust but verify? * none are novel/new, YMMV * can only speak to my own exp * in no particular order * added to/updated at random GL;HF 1/x
English
14
33
116
0
whiskers ๐Ÿ–ค
whiskers ๐Ÿ–ค@initinfosecยท
"The reason people get good ideas in the shower is because it's the only time during the day when most people are away from screens long enough to think clearly. The lesson is not to take more showers, but rather to make more time to think." -@JamesClear
English
0
1
2
297
Nick Frichette
Nick Frichette@Frichette_nยท
Today is an interesting day! I read a report about a threat actor, and for once I'm impressed! This is the first I can remember in which a TA has displayed NEW tradecraft, before researchers have shared it widely. Let's review in this ๐Ÿงต invictus-ir.com/news/the-curioโ€ฆ
English
10
76
261
55.7K
Nikhil Mittal
Nikhil Mittal@nikhil_mittยท
I am giving away 1 seat each for our upcoming bootcamps. Azure Cloud Attacks (CARTP) - 3rd Feb (9:00 AM ET) Active Directory Attacks (CRTP) - 4th Feb (9:00 AM ET) Please Reply, Like and Repost to participate. The winners will be announced on Friday 2nd Feb 2024. alteredsecurity.com/bootcamps #Azure #Redteam #Pentesting
Nikhil Mittal tweet mediaNikhil Mittal tweet media
English
323
353
524
63K