Manuel

727 posts

Manuel

Manuel

@0xc0ffee

Sec dude during the day, beer brewer at night. neutral as a neutron. backout plan: 40 30 78 63 30 66 66 65 65 40 69 6e 66 6f 73 65 63 2e 65 78 63 68 61 6e 67 65

Switzerland Katılım Temmuz 2009
2K Takip Edilen455 Takipçiler
Manuel retweetledi
Moritz
Moritz@m_r_tz·
The FLARE team now freely distributes its quality reverse engineering and malware analysis educational content at github.com/mandiant/flare…. Launched with: - Malware Analysis Crash Course - Go Reversing Reference - Intro to TTD
English
6
280
927
37.4K
Manuel retweetledi
Gadi Evron
Gadi Evron@gadievron·
We lost FX. A lot of people wrote about this so I feel comfortable sharing here too. I’m heartbroken. We’re heartbroken. At 8 am pacific today (Monday), we are gathering on Zoom to share memories of FX, as a community. Ping me for a link.
English
7
16
129
33.4K
Manuel
Manuel@0xc0ffee·
@JeremyUnplugged Jup.. Changed flight shortly before departure. Obviously suspicious.
English
0
0
0
24
JeremyUnplugged
JeremyUnplugged@JeremyUnplugged·
Raise your hand if you were ever heavily questioned by El Al security. 🙋🏽‍♂️
English
514
61
2K
587.5K
Manuel retweetledi
Splintersfury
Splintersfury@Splintersfury·
Update on the 58.5GB Windows driver analysis. After cleanup & dedup: ~28k drivers → 467 high-risk candidates. What stood out wasn’t rare bugs, but how often legacy patterns and fixes reappear across drivers. Part 2: threatunpacked.com/2026/02/04/bui…
English
0
14
40
2.8K
Manuel
Manuel@0xc0ffee·
@veorq for critical stuff I usually refer to the "Crystalline Cipher".. SCNR
English
0
0
0
403
JP Aumasson
JP Aumasson@veorq·
You’d have to be braindead to believe AES is secure in 2026. When we analyzed how AES implemented its “encryption”, we found multiple attack vectors. Use OEE instead github.com/veorq/oee
English
32
15
181
70.6K
Manuel retweetledi
Mandiant (part of Google Cloud)
Net-NTLMv1 is outdated, insecure, and must go. 🛑 To help defenders prove the risk and accelerate deprecation, we’ve released a comprehensive dataset of rainbow tables. See how easily these keys can be recovered, and secure your environment. Read more: bit.ly/4qpV6MJ
Mandiant (part of Google Cloud) tweet media
English
3
85
282
44K
Manuel
Manuel@0xc0ffee·
@ricci/115747843169814700" target="_blank" rel="nofollow noopener">discuss.systems/@ricci/1157478… historic recovery of a very old UNIX version from tape..
English
0
0
0
32
Dimitrios Kottas
Dimitrios Kottas@DimitriosKottas·
“No, it’s not what you think it is. It’s worse. Much worse"
Dimitrios Kottas tweet media
English
23
20
289
20.7K
Manuel
Manuel@0xc0ffee·
@malmoeb One of my favourite reports..
English
0
0
0
44
Stephan Berger
Stephan Berger@malmoeb·
For a new project, I started to dig into older threat reports, like for example, "The ProjectSauron APT" from 2016. [1] The interesting thing about these old reports is that you see techniques mentioned before that are still used 10 years later. "ProjectSauron usually registers its persistence module on domain controllers as a Windows LSA (Local System Authority) password filter. This feature is typically used by system administrators to enforce password policies and validate new passwords to match specific requirements, such as length and complexity. This way, the ProjectSauron passive backdoor module starts every time any domain, local user, or administrator logs in or changes a password, and promptly harvests the passwords in plaintext." There are various ways to register such "password filters", but the screenshot is from a recent case (and from one of my presentations) in which the attacker registered a new NetworkProvider to steal cleartext credentials. Techniques which are 10+ years old are still working and (mis-)used by attackers.. 🤷 [1] media.kasperskycontenthub.com/wp-content/upl…
Stephan Berger tweet media
English
2
4
26
2.8K