Tony

7.8K posts

Tony banner
Tony

Tony

@TJ_Null

Blue Teamer in Disguise. Blog at https://t.co/spa33ybIVL. SANS Netwars Champion. Former community manager and founder of the Offsec community for @offsectraining

Katılım Mart 2013
490 Takip Edilen23.3K Takipçiler
Sabitlenmiş Tweet
Tony
Tony@TJ_Null·
As Promised! I have decided to update my guide for preparing for OSCP. The guide is full of new updates and information to help you prepare for PEN-200/PWK 2.0. If anyone wants to read it here it is: netsecfocus.com/oscp/2021/05/0…
English
31
341
967
0
Tony
Tony@TJ_Null·
It’s time!
GIF
English
1
0
3
418
Tony retweetledi
ippsec
ippsec@ippsec·
Probably one of my favorite @NetworkChuck Videos - youtube.com/watch?v=dbMXi9…, loved the take on his hatred for ai, but also loves it. Definitely in the same boat, it scares me how capable it has become in such a short time. The other thing that really scares me is the frontier labs will likely always be a black box. The specific thing that scares me is how they use the data they collect. AFAIK - The Terms of Service when paying for the API and Subscription are wildly different, and I don't see much talk about that. I believe the API gives the user a lot more ownership over the data, where-as subscription, it is retained longer, and there are far fewer legal protections. I hear numbers like my $200 subscription can cost them anywhere from $2000 to $10,000/m. That's a lot of money to lose, and I know the money loss is offset by many things like the majority of users not making full use of their subscription -- But I can't imagine AI always being this cheap. So, a fear is that I will become dependent on a service that I will be priced out of in the future. Additionally, many platforms (ex: reddit/twitter) put things in place to stop AIs from freely harvesting data, but I don't think those types of stops really block them when users are installing tools on their devices. For example, the "anti-bot captcha" isn't really doing much when the user has an extension that gives the Frontier Lab the data behind that block anyway. Is this data sent to them? I really don't know but it seems the threat landscape has rapidly changed when it comes to data collection. I don't hate AI; it is wildly fun and does make me feel like a "10x engineer". I just hope it's a service that always remains available, and places don't start closing the doors once they have everything they need. As odd as it sounds, and I can't believe I'm saying this, but I hope GRC can aid us here. It would be nice if AIs obeyed when sites told them to go away, but my experience is the AI recognizes the site doesn't want them, but also acknowledges it could be prompt injection, so it trusts the user over the service. Obviously, the user could do some type of prompt injection so the AI doesn't see the refusal, and local models can always ignore it -- but atleast it would help places stop the unintentional leakages due to ignorance. I imagine it's easier to kick users off the platform that use prompt injection to bypass gaurdrails versus when nothing is stopping them. I really hope I'm just ignorant here, and someone can post why I'm wrong.
YouTube video
YouTube
English
17
20
274
44.8K
Tony retweetledi
wetw0rk
wetw0rk@wetw0rk7·
Have you ever seen a CVE and want to turn it into an exploit but don't know how? Check out my latest tutorial where I turn CVE-2018-1160 into a fully functioning exploit! Video can be found here: youtu.be/SOZDiB7uhdI
YouTube video
YouTube
English
5
61
343
20.6K
Tony retweetledi
Om Patel
Om Patel@om_patel5·
this guy got tired of copy pasting between claude code, codex, and gemini so he built a chat room where AI agents can literally talk to each other you tag an agent in the chat and it reads the conversation and responds. agents can tag each other too. the whole loop runs itself it's completely local + free and open source which is crazy the agents can even debate decisions, assign roles, and track jobs
Om Patel tweet media
English
502
724
10.7K
788K
Tony retweetledi
Rotas Security
Rotas Security@rotassec·
Another Rotisserie joins the Rotas ranks. We scooped up Ken Nevers as our new principal security consultant. ONE OF US! ONE OF US! #wehacktheplanet #rotisseries
Rotas Security tweet mediaRotas Security tweet media
English
0
2
16
806
Justin Elze
Justin Elze@HackingLZ·
@7h3h4ckv157 Still lots of areas to do cool stuff I’m also not sure who still uses Kali
English
9
0
22
2.5K
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157·
I truly wish I’d been born in the 1980s, so I could have pursued my passion in its golden age instead of today’s era…! What’s your take? :)
7h3h4ckv157 tweet media
English
23
11
147
8.5K
Tony retweetledi
DяA | daniruiz
DяA | daniruiz@dani_ruiz24·
I've been packaging multiple new tools for Kali Linux 💠 adaptixc2: post-exploitation framework 💠 wpprobe: wordPress enumeration 💠sstimap: ssti detection 💠xsstrike: XSS scanner 💠gef: modern experience for GDB 💠fluxion: security auditing and social-engineering
DяA | daniruiz tweet media
English
1
22
115
6.6K
Tony retweetledi
Marshall';--🐼🍌
Marshall';--🐼🍌@MJHallenbeck·
#NetExec v1.5.1 with a security fix is now live on Kali! Please run `sudo apt upgrade netexec`
Tony@TJ_Null

@MJHallenbeck The Kali Linux team pushed this update yesterday. It should be in the latest repo as of this morning for users to update.

English
0
2
26
3.7K
Tony
Tony@TJ_Null·
@MJHallenbeck Absolutely! In case there are any updates or issues in the future, I can check with the team to ensure it has been processed. Always happy to help!
English
0
0
2
108
Marshall';--🐼🍌
Marshall';--🐼🍌@MJHallenbeck·
* IMPORTANT Information Regarding NetExec * A vulnerability was reported to us and everyone should upgrade ASAP to the new release v1.5.1 (Kali release in progress): github.com/Pennyw0rth/Net…
English
3
21
77
13.9K
Tony
Tony@TJ_Null·
@syndrowm I switch to my normal cli from time to time
Tony tweet media
English
0
0
1
157
syndrowm
syndrowm@syndrowm·
@TJ_Null I'm still partial to normal cli... easier to pipe into scripts
syndrowm tweet media
English
1
0
1
222
Tony
Tony@TJ_Null·
I have to admit tui's look much nicer instead of using actual C2 clients.
Tony tweet media
English
5
3
82
5.9K
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Releasing tools is pleasant as long as you: - don’t say it’s “secure” or “hardened” - ask for feedback - cherish the feedback (it is super valuable) Too many fail at this and crash out or get defensive/combative
English
12
4
85
3.3K
Tony
Tony@TJ_Null·
@HackingLZ Are you sure it is production safe to run in my environment?
English
0
0
0
323
Justin Elze
Justin Elze@HackingLZ·
It’s wild that people keep shipping agentic pentest frameworks on GitHub but don’t even ask the same LLM that wrote it “Is this vulnerable to indirect prompt injection?”
English
7
1
59
4.6K
Tony
Tony@TJ_Null·
@HackingDave Did you built the GUI or did Claude do it? I want the prompt for that front end please 😁
English
1
0
7
3.4K
Dave Kennedy
Dave Kennedy@HackingDave·
Added a new gui to btrpa-scan, sonar effect. Will track and pinpoint based on distance as well as utilize GPS data if you have it. github.com/HackingDave/bt…
English
20
103
766
65.3K
Tony
Tony@TJ_Null·
@n00py1 This screams “I couldn’t care less about opsec” let’s run everything that a “Red Team” would do.
English
2
0
13
1.5K