What.

737 posts

What. banner
What.

What.

@VoidStation_

CyberSec Engineer, OffSec, Adversary Emulation, Retro PC stuff and all things IT infrastructure 😙

Katılım Şubat 2017
3.6K Takip Edilen222 Takipçiler
Traceix
Traceix@usetraceix·
We're doing a HUGE giveaway. We're giving away 20 copies of Black Mass Volume II by @vxunderground and 2 free paid plans (1 Analyst plan, 1 Cyber Analyst plan). In order to win, comment below until Sept 27th 2023 (one week and winners will be selected). This giveaway would not be possible without the generous donation from @Laughing_Mantis. Everyone thank them as well.
English
325
31
199
58.8K
What. retweetledi
Bryce
Bryce@bryceabdo·
the SOC when an alert for suspicious powershell usage hits the queue
English
49
400
2.1K
0
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
*notices you from across the room* *begins orbiting*
English
6
16
173
0
Jason Hill
Jason Hill@jasonhillva·
Is @SerpicoProject dead or is it still active? Is there a better alternative that is also free? I've used it in the past and was thinking about incorporating it into my current program.
English
3
0
0
0
What. retweetledi
Kyle Avery
Kyle Avery@kyleavery·
Besides BloodHound from @_wald0 + @SpecterOps and PingCastle from @mysmartlogon, what other open source or free tools should every organization be running on a regular basis?
English
17
34
164
0
What. retweetledi
Apogee Entertainment
Apogee Entertainment@Apogee_Ent·
As promised: 10k follower giveaway! Simply retweet this post and make sure you're following us to enter. Winner will be chosen tomorrow, January 25th.
Apogee Entertainment tweet media
English
16
368
289
0
What. retweetledi
Sean Metcalf
Sean Metcalf@PyroTek3·
Here's some recently published guidance from Trimarc on how to better protect admin credentials and mitigate ransomware impact: trimarc.co/tw-ProtectingP…
English
1
15
41
0
What. retweetledi
dylan
dylan@_batsec_·
I'm releasing my tool to exploit AD CS relaying. It will automate most the steps required for both local and domain privilege escalation. The images below show how it can be used to get a beacon as system on a domain controller.
dylan tweet mediadylan tweet mediadylan tweet mediadylan tweet media
English
13
417
1K
0
What. retweetledi
Ryan Newington (MVP)
Ryan Newington (MVP)@RyanLNewington·
My lockdown project last year was to build a toolkit to help organisations break attack chains and better defend against lateral movement. I've very proud of what we've achieved with Access Manager. LAPS and JIT for AD-joined hosts made easy, secure, and auditable.
Lithnet@lithnet_io

It's finally here. Lithnet Access Manager makes LAPS easy with mobile-friendly, web based access to LAPS passwords and bitlocker recovery keys, as well as providing JIT for windows admins and optional laps password encryption! github.com/lithnet/access…

English
6
27
109
0
What. retweetledi
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
For Windows Event Collection with no agents on the machine, LogBinder SuperCharger is the coolest software. I even got them to add all the Palantir event collection profiles by default. You could implement NSA-compliant collection in a few hours for a whole domain, load-balanced.
English
4
21
169
0
What. retweetledi
The DFIR Report
The DFIR Report@TheDFIRReport·
Trickbot Still Alive and Well ➡️Discovery: AdFind, Nltest, Net, Bloodhound, PowerView ➡️Lateral Movement: SMB, WMI, PS ➡️C2: Trickbot & Cobalt Strike ➡️Credential Access: Ntdsutil & lsass dump ➡️PrivEsc: Named Pipe ➡️Defense Evasion: Trickbot->Wermgr thedfirreport.com/2021/01/11/tri…
The DFIR Report tweet mediaThe DFIR Report tweet mediaThe DFIR Report tweet mediaThe DFIR Report tweet media
English
1
102
187
0
What. retweetledi
Jeff McJunkin
Jeff McJunkin@jeffmcjunkin·
Here's a threat on some overpowered technologies to slow down attackers that you can implement _now_. First, re-implement LAPS (microsoft.com/en-us/download…) at your peril. 1/14
English
15
348
940
0
What. retweetledi
FABINO
FABINO@KinoFabino·
There is only one Doom pillow and two of us 👉👈
FABINO tweet media
English
32
116
1.4K
0
What. retweetledi
Kotaku
Kotaku@Kotaku·
Morrowind completely rebooted your Xbox during some loading screens: bit.ly/33Oo4wM
Kotaku tweet media
English
3
31
180
0
What. retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft is actively tracking threat actor activity using exploits for the CVE-2020-1472 Netlogon EoP vulnerability, dubbed Zerologon. We have observed attacks where public exploits have been incorporated into attacker playbooks.
English
7
515
764
0
What. retweetledi
Steve Syfuhs
Steve Syfuhs@SteveSyfuhs·
Let's talk Azure AD join and what that means to a Windows device. What's it mean to be joined to something?
English
14
189
764
0