Orig3n retweetledi
Orig3n
150 posts


👏 Congratulations. I know being on the Blue side can be stressful! Had a fun time thinking Red team thoughts :)
Southwest CCDC@SWCCDC
Congratulations to the following teams for qualifying for the 2024 SWCCDC regional event: @Baylor @LATech @PhilanderSmith @SamHoustonState @SAC_PR @TAMU @UTAustin @utulsa We look forward to seeing everyone in March!
English

@OrOneEqualsOne That’s a great logo! I’ved used 5rr for logos and once for a voice actor 🤣
English

I wanted a logo for a new open-source windows log tail tool I'm developing and decided to give fiverr.com a try. I submitted the sketch and instructions below and $35 and 23 hours later I had the logos shown. I'm happy with that!


English
Orig3n retweetledi

Gonna be in Bentonville on April 15th attending #Sp4rkCon and then performing at a separate party later.
About to take over this whole midwest con party scene 😤
HackNWA@HackNwa
Looking for a day packed with infosec events on Apr 15th you should check out #Sp4rkCon and @HackNWA in Bentonville. All events are free and open to the public! hacknwa.org/HoK.NFO
English
Orig3n retweetledi

I'm teaching my PowerShell For InfoSec course live online for the first time on 3/2/23 and 3/3/23. It is a 2 day class for $575 from @Antisy_Training. Have you already taken the On-Demand (pre-recorded) version? What did you think? Check it out here: antisyphontraining.com/powershell-for…
English

@PeteABryan @maarten_goet Just saw the agenda yesterday, look forward to seeing your talk!
English
Orig3n retweetledi

The next run of PowerShell for InfoSec:What You Need to Know! w/ @OrOneEqualsOne, that be during our summit, we're honored to be supporting @cybher_dsu w/ 10% of our revenue from this class!
Class registration: antisyphontraining.com/powershell-for…
Support this project: cybher.org
English

@volodarik How many of those 1M+ didn’t finish setting up their accounts because of a valid phone number requirement?
English

BACK IN STOCK at FLIPPER DEVICES !
Flipper Zero $169.00
shop.flipperzero.one/products/flipp…
English

@DFIRmadness @breadpir8 @DebugPrivilege I think what @cyberthrunter did with RemoteIPType == “Public” might be more efficient.
English

@breadpir8 @DebugPrivilege You could add this to filter private address | where ipv4_is_private(RemoteIP) == false
English

@DebugPrivilege Devicenetworkevents
| where localport ==“3389”
| summarize count() by remoteip
assumed that IPs from internet are contacting you
Shodan query for port:3389 & ip
Assume rdp running on 3389… might be able to query defender for rdp on nonstandard port?
English

Just learned about this cool lots-project by @mrd0x. Here is a MDE KQL #threathunting query that looks for lolbins talking to lots-project domains. gist.github.com/jllangley/acc5…
English

Thinking of different ways of #threathunting lolbins, especially ones that don’t normally communicate over the network. This is a good base query to get started in Microsoft Defender for Endpoint. #kql gist.github.com/jllangley/ebae…
English

@bettersafetynet Roll out Microsoft Defender for MacOS and create detections.
English








![[audible]blink](https://pbs.twimg.com/profile_images/1257518672211574785/rw3NzaA5.jpg)
![[audible]blink tweet media](https://pbs.twimg.com/media/Fjl1IiRXwAAm6zB.jpg)

