Pat_H

211 posts

Pat_H banner
Pat_H

Pat_H

@pathtofile

Dad, researcher, and infosec psudo-specialist, posts and thoughts are my own. He/Him. @[email protected]

Australia 가입일 Ekim 2018
269 팔로잉461 팔로워
Pat_H 리트윗함
Interrupt Labs
Interrupt Labs@InterruptLabs·
The latest instalment of our VR Development Programme training material is available on GitHub now – learn the basics of reverse engineering! github.com/interruptlabs/…
Interrupt Labs tweet media
English
1
20
73
5.7K
Pat_H 리트윗함
Bits & Bops 🎵 OUT NOW!
Bits & Bops 🎵 OUT NOW!@TempoLabGames·
BITS & BOPS IS OUT NOW! 🎶 🎮 Over 20 original rhythm mini-games! 🎵 Catchy music! ⚡ Snappy gameplay! ✨ Gorgeous 2D animation! PLAY IT NOW ON STEAM! 💕
English
133
2.1K
9.9K
350.1K
Pat_H 리트윗함
Pat_H 리트윗함
Jonny Johnson
Jonny Johnson@JonnyJohnson_·
A while back I was curious about the access check that occurs when someone tries to consume from the Threat-Intelligence ETW provider. I decided to write a short blog on the topic. jonny-johnson.medium.com/peeling-back-t…
English
0
22
61
10.1K
Pat_H 리트윗함
RooCon
RooCon@RooCon_AU·
🎉 RooCon25 is coming! 🎉 Join us on 5-6 November for our 3rd edition! As one of Australia's key cyber threat intelligence conferences, we're building on past success to make this our best event yet. Our Call for Papers opens in just one week! [1/3]
English
1
9
18
2K
Pat_H 리트윗함
UwU Underground
UwU Underground@uwu_underground·
Normalize Conference Talks To Also Include Talks About Failed Projects and Failed Research Tell us stories of the journey and the struggles. None of us are perfect and We should stop admitting that we all haven't completely screwed up research.
English
16
11
106
7.9K
Pat_H 리트윗함
Ivan Kwiatkowski
Ivan Kwiatkowski@JusticeRage·
Some personal news: I will be joining @Meta's security team (focusing on WhatsApp) starting next week. This is a big life change, I'm also moving to London permanently. I took this opportunity to reflect on the state of threat intel: blog.kwiatkowski.fr/threat-intel-t… LMK if it resonates!
English
23
44
355
23.1K
Pat_H 리트윗함
i✌️erify
i✌️erify@IsMyPhoneHacked·
Heading to #OBTS v7? There are still spots open in iVerify researcher @Helthydriver's workshop on iOS threat hunting. Special Bonus: On day 3 of this training you will analyze an actual Pegasus case & learn the skills to dissect the Malware on your own. objectivebythesea.org/v7/trainings.h…
English
0
5
9
3K
Pat_H 리트윗함
Alex Ionescu
Alex Ionescu@aionescu·
It’s wonderful to see what @XenoKovah and his collaborators have built for the community. I always recommend OST2 for my new hires and other juniors, or just anyone trying to get started on a new topic. The courses are excellent. It’s an honor to sponsor the Windows Security Path
Alex Ionescu tweet media
OpenSecurityTraining2@OpenSecTraining

Thanks to Winsider Seminars & Solutions (@yarden_shafir & @aionescu) for Sponsoring #OST2 at the Gold🥇 level! Learn more about them here: windows-internals.com

English
0
16
113
16.4K
Pat_H
Pat_H@pathtofile·
Extremely grateful to everyone who shared the knowledge I needed to bootstrap this research, including @Helthydriver, @citizenlab, and others without twitter handles. I've only just started, but I hope sharing what I've done so far encourages others to also investigate further /4
English
0
0
1
89
Pat_H
Pat_H@pathtofile·
As discussed in the blog, while I don't think logs could serve as the only basis for a security system, I've discovered enough logging events about small, disparate parts of an attack that might serve as an early-warning system to encourage a more forensic investigation. 3/4
English
1
0
1
99
Pat_H
Pat_H@pathtofile·
Getting back into research and blogging after a long break, I decided to learn something new and investigate how to create realtime malware detections on iOS using Unified Logging and Lockdown Services: blog.tofile.dev/2024/10/24/ios…
English
1
1
6
189
Pat_H 리트윗함
Zeroed
Zeroed@Zeroedtech·
I'll be running a free 3 hour training session at @BSidesCbr teaching people how to defend IIS servers by learning how to attack them. I'll be posting recommended host setups closer to the event so be sure to give me a follow. cfp.bsidescbr.com.au/bsides-canberr…
English
0
4
7
543
Pat_H 리트윗함
John U
John U@jdu2600·
Thanks @Bsides_BNE for letting me talk about why “Kernel ETW is the best ETW”. It’s not everyday that you get to talk about scripting a decompiler after watching a keynote from the mother of decompilers…
John U tweet media
English
1
7
28
4.9K
Pat_H 리트윗함
RooCon
RooCon@RooCon_AU·
🦘CFP announcement imminent.
Français
0
6
10
4.7K
Pat_H 리트윗함
Will Harris
Will Harris@parityzero·
I published a step by step guide on using Windows event logs to hunt for malware trying to steal sensitive data from browsers e.g. cookies, passwords etc. security.googleblog.com/2024/04/detect… #DFIR Hope it's useful!
Will Harris tweet media
English
7
177
554
134.3K
Pat_H 리트윗함
watchTowr
watchTowr@watchtowrcyber·
Another week, another SSLVPN RCE - this time, it's CVE-2024-3400 in Palo Alto's GlobalProtect. But, we've seen no public analysis 🙁 so, allow us.. labs.watchtowr.com/palo-alto-putt…
English
8
100
245
45.9K
Pat_H 리트윗함
Dino A. Dai Zovi
Dino A. Dai Zovi@dinodaizovi·
I would be *shocked* if this code was only used for this attack... There is so much reusable kit in both the shell script and the injected payload that I think it's reasonable to assume that they have also been used elsewhere.
blasty@bl4sty

xz bd engineer 1: bro, we need a way to probe the address space to make sure we never SEGV sshd xz bd engineer 2: we'll just do a pselect syscall with empty fd sets, a timeout of 1 nanosecond and the addr we want to probe is passed as the sigmask pointer, EFAULT means unmapped

English
1
30
127
72.7K
Pat_H 리트윗함
Anthony Weems
Anthony Weems@amlweems·
I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-) github.com/amlweems/xzbot
Anthony Weems tweet media
English
51
835
3.9K
631.7K