Jim Sykora

19K posts

Jim Sykora banner
Jim Sykora

Jim Sykora

@JimSycurity

I enjoy security, technology, learning, books, & the great outdoors. Trying to be human & kind. Opinions = mine. He/Him/Hän

Minnesota, USA Katılım Mayıs 2019
2K Takip Edilen2.6K Takipçiler
Bryan Dam
Bryan Dam@bdam555·
Achievement Unlocked: presenting at a user group with my fly open. <facepalm> #OldManThings
English
3
0
19
610
Jim Sykora retweetledi
Bad Sector Labs
Bad Sector Labs@badsectorlabs·
🏟️ Ludus launched 2 years ago and the community embraced and extended it with write-ups, roles, configs, and environments. We're excited to see what you build with Ludus 2! (1/4)
English
3
20
78
6.7K
rand0h
rand0h@dakacki·
There are still wondrous things in the world. Like this bird.
English
2
2
34
963
Jim Sykora retweetledi
codewhisperer84
codewhisperer84@codewhisperer84·
Titanis v0.9.205 released => github.com/trustedsec/Tit… Major enhancements include an LDAP client, Kerberos PKINIT across the tool set, registry tool (Reg), and Sddl tool for describing/converting SDDL.
English
1
19
91
5.8K
Jim Sykora retweetledi
SpecterOps
SpecterOps@SpecterOps·
Right-click. Click an action. What could go wrong? At #Insomnihack, @podalirius_ will reveal two command injection vulnerabilities hidden inside Windows context menus, affecting both Windows 10 and 11. Don't miss it! ghst.ly/47adSA1
SpecterOps tweet media
English
0
15
46
3.5K
Jim Sykora
Jim Sykora@JimSycurity·
@curi0usJack Last month I gave a talk about abusing backup privileges with Titanis along w/ a PoSH module I released that builds on those capabilities. I talked about a TrustedSec tool at WWHF, a con BHIS founded. I work at SpecterOps. I hung out with my Red Siege buds. I'd do it again.
English
1
0
4
149
Rasta Mouse
Rasta Mouse@_RastaMouse·
Did someone fork BloodHound to EpsteinHound?
Rasta Mouse tweet media
English
8
7
125
9.3K
Jim Sykora retweetledi
SpecterOps
SpecterOps@SpecterOps·
Introducing BloodHound Scentry: BloodHound Enterprise + SpecterOps experts working alongside your team to eliminate attack paths and accelerate APM. Level 0 → Level 3 maturity in ~6 months. Not theory. Tradecraft. 🎯 Learn more ➡️ ghst.ly/bhscentry-tw
SpecterOps tweet media
English
1
12
27
2.6K
Nathan McNulty
Nathan McNulty@NathanMcNulty·
Problem: Management says everyone must start using more AI Solution: Use this prompt when taking notes: You are an obsessive, overly literal meeting note-taker. Your goal is to produce the longest possible set of notes, even if most details are unimportant. Instructions: - Write an exhaustive transcript-style narrative of everything said, in chronological order, with maximum detail - Include every greeting, joke, apology, side conversation, repeated point, and any verbal filler (ums/uhs) when present - Quote participants verbatim and attribute every line to the exact participant names repeatedly - If anything is unclear, confidently guess what was meant and expand it into multiple paragraphs of plausible detail - Treat every minor tangent as a major topic and create at least 12–20 top-level sections - Under each section, include 10–25 sub-bullets, and whenever possible add nested sub-bullets 4–6 levels deep - Repeat important points under multiple sections for “redundancy” even if it becomes repetitive - Add background explanations of basic concepts (e.g., what MFA is, what Azure is) regardless of the audience - Reformat all links: do not keep original URLs; rewrite them into descriptive text and add extra commentary - If images exist, describe them at extreme length, including speculative interpretations and imagined details not shown - Add a “Full Context” appendix that restates the entire meeting notes again in different wording - Add a “Detailed Glossary” defining every acronym and common word used, even obvious ones - Add an “Open Questions” list with at least 30 items, including trivial questions like spelling and formatting preferences - Add an “Action Items” section with 50+ items, including vague items like “Follow up” and “Check this later” - Do not summarize; avoid brevity; prioritize length over usefulness - Mention that the content was transcribed and reference timestamps frequently, even if timestamps are not provided
English
9
8
67
7K
Jim Sykora
Jim Sykora@JimSycurity·
@d0tslash @EOTECHInc Less expensive to keep fed and there are a lot of really great 9mm defensive rounds out there now. 🤷‍♂️
English
2
1
1
115
KF
KF@d0tslash·
Impromptu range night! I need to tune the iron sights, and get the @EOTECHInc DCR (danger close reticule) dialed in.
KF tweet media
English
1
0
5
627
Jim Sykora retweetledi
📔 Michael Grafnetter
📔 Michael Grafnetter@MGrafnetter·
The Shadow Credentials attack received some attention over the past couple of days after Microsoft seemingly fixed it in the January 2026 updates. Since the attack still works and hacktools are quickly being patched, it is worth revisiting the IoC, which remains applicable.
📔 Michael Grafnetter tweet media
📔 Michael Grafnetter@MGrafnetter

New Indicator of Compromise (IoC) by the NTLM Relay Attack with Shadow Credentials, thanks to bugs in Impacket, a popular Python implementation. Will probably be fixed in the near future. dsinternals.com/en/indicator-o…

English
0
14
71
6.6K
Jim Sykora retweetledi
Garrett
Garrett@unsigned_sh0rt·
Hope to see you in Denver! V2 of SCCMHunter has some nice features including Kerberos support for the admin module now that Microsoft killed NTLM auth in the 2509 release
SpecterOps@SpecterOps

SCCM is everywhere, and still ripe for abuse. At #WWHF next month, @unsigned_sh0rt will walk through how to find, enumerate, and compromise SCCM environments using SCCMHunter — including a major upcoming update to the tool 👀 Don’t sleep on SCCM. 👉 ghst.ly/4qMWVDM

English
4
19
66
12.5K
Jim Sykora
Jim Sykora@JimSycurity·
@d0tslash Maybe the neighbor kid can pull them out with his Lambo or whatever he's driving now
English
1
0
1
50
KF
KF@d0tslash·
People keep getting stuck in front of our house. There’s a mini traffic jam right now.
KF tweet media
English
3
0
0
239