Balthasar

65 posts

Balthasar

Balthasar

@BalthasarMartin

Red team lead @ https://t.co/fkrENrHmF5 @[email protected] (he/him)

Katılım Kasım 2017
241 Takip Edilen214 Takipçiler
Balthasar retweetledi
syndrowm
syndrowm@syndrowm·
Catching up with my watch list. Good stuff from @n1v4d0 and @BalthasarMartin at #Troopers24 youtube.com/watch?v=Gmtwtw… > Effective honeypots are easily encountered and suggest a worthwhile attack path Honeypots should: - Be easy to find - Appear valuable - Blend in - NOT be exploitable - Minimize false positives
YouTube video
YouTube
Balthasar@BalthasarMartin

Today at #Troopers24 we released Certiception – the ADCS honeypot we always wanted to have. Blog: srlabs.de/blog-post/cert… Source code: github.com/srlabs/Certice… Slide deck, including our guide to deception strategy: github.com/srlabs/Certice…

English
0
2
1
395
Balthasar retweetledi
Olaf Hartong
Olaf Hartong@olafhartong·
@_wald0 and @Jonas_B_K dropping great info on ADCS attack paths at #troopers. Jonas looking particularly great in that shirt 😉
Olaf Hartong tweet media
English
2
4
32
2.7K
Balthasar
Balthasar@BalthasarMartin·
Here's how the ESC1 honeypot looks for hackers. ... which is the connection to the great ADCS attack path talk by @Jonas_B_K and @_wald0 :)
Balthasar tweet media
English
2
6
24
4.5K
Balthasar
Balthasar@BalthasarMartin·
Less than two days until we present our deception strategy at #TROOPERS24 and publish the Active Directory honeypot we always wanted to have. Let's say there is an interesting connection to the talk from @Jonas_B_K and @_wald0...
English
0
4
9
455
Balthasar retweetledi
linuzifer
linuzifer@Linuzifer·
Looking forward to Bsides Berlin tomorrow @ c-base. I hear you can still get tickets? bsides.berlin
English
1
8
14
0
Balthasar retweetledi
BSides Berlin
BSides Berlin@SidesBer·
#BSidesBerlin Speaker Showcase EDRs are everywhere but relatively little is known about how the tools work and how to effectively circumvent them. @jrrgimenez will discuss insights on EDR inner workings and evasion options gathered over years of intense red teaming.
BSides Berlin tweet media
English
0
3
10
0
Balthasar
Balthasar@BalthasarMartin·
First row front page now without being logged in. Had to refresh the window three times to get it there. Running for almost 2h now with 0.67 BTC (~14k USD) and 12.4 ETH (~20k USD) obtained so far.
Balthasar tweet media
English
1
0
0
0
Balthasar
Balthasar@BalthasarMartin·
Stream running for >1h now with 2.2k people watching. Receiving addresses on the scam website seem static so far, with 0.11 BTC (~2.3k USD) and 1.8 ETH (2.9k USD) received right now.
English
1
0
0
0
Balthasar
Balthasar@BalthasarMartin·
Youtube just placed this crypto scam live stream in my main feed. It autoplayed while I scrolled over it and shows a legit discussion with the scam part next to it. Domain registrar and IP in Russia. No idea whether that's usual or a rare thing to have it so prominently...
Balthasar tweet media
English
1
0
0
0
Balthasar
Balthasar@BalthasarMartin·
If you liked our blog post on exploiting Telerik CVE-2017-9248, (srlabs.de/bites/telerik-…) but were missing a tool: someone created one based on our post. Now that it's out, maybe we should publish our version as well... :)
Black Lantern Security (BLSOPS)@BlackLanternLLC

Crypto-oh-my-god! @paulmmueller is at it again! What's old is new with Telerik exploits! A new tool release! Check out our write up on a new exploitation tool! blog.blacklanternsecurity.com/p/yet-another-…

English
0
2
5
0
Balthasar
Balthasar@BalthasarMartin·
@BlackLanternLLC @paulmmueller About publishing exploits, imo there's no right or wrong. In that case we decided against it for above reasons. - You couldn't reach us -> Not sure what channels you used, we're usually happy to help others in the community. Can you send me a DM, I would like to check :) 2/2
English
1
0
1
0
Balthasar
Balthasar@BalthasarMartin·
@BlackLanternLLC @paulmmueller Great post and thanks for the credit! I'm the red team lead at SRLabs, regarding your questions: - Not publishing the exploit, but detailed info -> We wanted to share risk and knowledge, but not enable criminals too easily 1/2
English
1
0
3
0
Balthasar
Balthasar@BalthasarMartin·
@HonkHase @GossiTheDog Laut Comments passiert die Interception lokal für Malware-Detection und der Traffic ins Internet benutzt normale Zertifikate. Weiß sonst nichts über NordVPN und man kann davon halten, was man will, aber ist vlt ne relevante Info :)
Deutsch
0
0
0
0