solst/ICE of Astarte

17.6K posts

solst/ICE of Astarte banner
solst/ICE of Astarte

solst/ICE of Astarte

@IceSolst

Pentester turned seceng turned meeting canceller - meetup https://t.co/E4rlINC0U6 - conf tracker https://t.co/tReNhuhANF

villa straylight Katılım Kasım 2024
2.1K Takip Edilen28.7K Takipçiler
Sabitlenmiş Tweet
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Here's a thread of every app I've built 100% with @cursor_ai using Claude. These are all fun side projects I've worked on in my free time over the last few months.
English
61
121
2.7K
596.3K
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
The frustration with MCP is imo an issue in itself. You don’t want to adopt a system that just pisses people off and frustrates your devs, just because a minority are pushing for it. Th sentiment around MCP is generally negative, for good reasons (see great video below).
Zack Korman@ZackKorman

I got mad about people defending MCP so I made this video. The first minute is just me being very mad, but then I tried to contribute something of value after that. youtube.com/watch?v=m0VyZU…

English
8
1
51
2.6K
solst/ICE of Astarte retweetledi
eigenvalue
eigenvalue@JeniaD·
@IceSolst Everything is a C2 if you’re claude enough
English
1
2
14
1.6K
Bryson 🦄
Bryson 🦄@brysonbort·
Immunize yourself against dumb. 🦄
English
4
1
26
982
solst/ICE of Astarte
@blackroomsec These are great, and will likely remain. Overall did it raise the bar, level of effort, required? Generally that seems to trend upwards (I think? If we spend enough effort) so I think that’s good
English
1
0
5
657
BlackRoomSec
BlackRoomSec@blackroomsec·
And, how have bad actors responded to these changes? No more mutating passwords into cleverly thought out wordlists with JtR derived from UEBA, but now going after the RMM tools directly, bypassing all the hard work, because the crown jewel creds are ripe for the taking, especially when the vendors aren't securing their accounts into the client's environment and the clients, who swear they have implemented zero trust or least privilege and aren't compliant in all these frameworks, lied, and forgot to or don't know how to audit their NHIs. Which turned into > Token theft when MFA morphed into OTP. Which turned into > MFA now phish- resistant, token theft now harder or non viable attack vector, as is password spray with conditional access, can't get in via conventional routes, let's have them send their creds to us via POST with an Infostealer which evades most AV/IDS Which turned into > Crowdstrike, when it's not doing our job for us and turning the clients environment into thousands of electric paper weights, hard to bypass if configured properly, vendors getting wiser, what else do the users do that we can leverage into an open door with minimal flex on our part? SHAI HALUD THE SLEEPER HAS AWAKENED Supply Chain Compromise!
English
1
0
10
1.3K
solst/ICE of Astarte
Remember “zero trust” a decade ago. The idea was: idc if it’s coming from the office. We need to authenticate all devices. We’re seeing a continuation of that today: are you typing on your keyboard, or via Claude remote, or is it an agent in your machine? Doesn’t matter, every action should be monitored at runtime based on what it’s doing, and the access requested etc. Evolution: Trust inside the perimeter —> trust based on device/identity —> trust based on each action
English
19
22
239
17.5K
Bryson 🦄
Bryson 🦄@brysonbort·
Explain AI to me in 0 words.
English
113
5
73
9.8K
solst/ICE of Astarte
@0xMatt Hello yes I would like to allow these three million IPs to send email on my behalf, including email providers that anyone can sign up for. Also soft fail because I may be wrong and there’s prob another million IPs.
English
2
2
78
3.6K
Matt Linton
Matt Linton@0xMatt·
Confused that you have strong DKIM/DMARC rules & configured SPF, yet people are still spoofing your CEO's mail in fraud attempts? This may be because you included Salesforce, Mailchimp, or other SaaS in your SPF. Abusers can use free/fraudulent accounts there to spam "as" you.
English
14
31
390
30.8K
solst/ICE of Astarte
@JeffBohren Yes agreed, my post is theory. How do you apply this in practice? I have no idea, it’ll probably take years
English
1
0
12
454
Jeff Bohren
Jeff Bohren@JeffBohren·
@IceSolst Great concise explanation of Zero Trust. Unfortunately almost no enterprise is ready to authorize based on each action. Right now most enterprises are struggling to identify what Shadow AI Agents are even running in their enterprise, much less bringing them into Zero Trust.
English
1
1
6
665
Mike
Mike@Croczillak·
@IceSolst You're moving into sloperations?
English
1
0
1
9
solst/ICE of Astarte
Within a year, we will start merging PRs with no human review, fully automated. It will slowly get normalized.
English
22
0
81
5.6K
nolen
nolen@itseieio·
terminal to terminal communication prototype
Français
7
4
160
13.3K
solst/ICE of Astarte retweetledi
solst/ICE of Astarte
“We tabletop’d this exact scenario:)” Nothing beside remains. Round the decay Of that colossal Wreck, boundless and bare The pwnd and ransomwared sands stretch far away.
English
0
5
51
3.2K