cat name | less

222 posts

cat name | less banner
cat name | less

cat name | less

@catpipeless

Katılım Eylül 2018
512 Takip Edilen37 Takipçiler
cat name | less
cat name | less@catpipeless·
@Teach2Breach @rez0__ Increased velocity of threat and criticality of response, would seem to indicate that expert level offensive and defensive security would be more important going forward, not less.
English
0
0
0
57
K̵i̵r̵k̵ ̵T̵r̵y̵c̵h̵e̵l̵
isnt this going to obliterate the reward for finding bugs? won’t the cost of finding bugs be reduced to a cost of compute and likely drive bug bounty rewards down toward that? i dont see why this is exciting outside the very short term. its concerning and i dont see anyone saying what happens next or what everyone in the security industry is supposed to do once software and security become obsolete due to the velocity of offense far surpassing defense react time. im confused why i should be happy about this and why i should help feed the thing that is going to eat the industry. people say its still a tool, but lets be real, its probably already more useful than most pentests you can buy, it wont be long before no one cares to have a security person run the tool and they just make their dev teams use it. im trying not to doompill but im shocked that people working in security are not more concerned about their ability to remain employed in the near to medium term
English
2
0
12
1K
cat name | less
cat name | less@catpipeless·
@checkymander Is Sloperator a new tier below skid? Above skid? Does it assume you use AI to create tools? What does the new leetness pyramid look like?
English
2
0
0
32
cat name | less
cat name | less@catpipeless·
@nickvangilder @anton_chuvakin If you’re not doing things at least somewhat insecurely, you can’t move fast enough to keep up. You have to compromise somewhere. That is the wisdom of defense in depth, least privileges, and blast radius reduction.
English
0
1
1
348
Nick VanGilder
Nick VanGilder@nickvangilder·
We spend all this time and money trying convince our user base to be less trusting and more cynical. We subject them to phishing simulations. We have identify verification procedures for them to follow (thanks Scattered Spider!). We harp on them to never blindly approve push notifications. Yada yada yada. …and then we turn around and pip install litellm Sometimes I wonder what our average non-techy non-security users think of us.
Nick VanGilder tweet media
English
3
3
22
3.7K
cat name | less
cat name | less@catpipeless·
@_xpn_ Agents fall into this trap too if you try to have them run the eval for you.
English
0
0
0
40
Adam Chester 🏴‍☠️
Watching my Claude agent heading into a nosedive during eval and trying to not interfere must be a similar to nature documentarians seeing a lion approaching a buffalo... You know not to interfere... but it's so hard!
GIF
English
1
1
16
1.6K
Dave Kennedy
Dave Kennedy@HackingDave·
Think of a fleet of 24/7 workers that look at all of your analysts responses - look at the submissions from edrs siems event logs etc - and when things are like hmm maybe I dunno 100% - it looks at that and says well how do I get to a 100% I do know.. I need either more data or I need to be trained more in incident response or web apps or this specific technology. It enrolls the agent to learn more about that topic goes through all training classes and now knows this in the future
English
2
0
6
322
cat name | less
cat name | less@catpipeless·
@sergical @steipete I got this working this weekend by changing all the anthropic agents to us.anthropic version. Also there was some hook defaulting to anthropic api. Idk I took a page out of your book and had kiro-cli run through things for me.
English
0
0
1
45
Peter Steinberger 🦞
Peter Steinberger 🦞@steipete·
Great guide how to setup @openclaw on AWS for free.
Tech Friend AJ@techfrenAJ

Deployed @openclaw in under 5 minutes on AWS free tier. Open source personal AI. Full system access. Interfaces through WhatsApp, Discord, Telegram. People are rigging it to their Ray-Bans for real-time price comparisons. One command. That's it.

English
41
141
2.1K
293.4K
cat name | less
cat name | less@catpipeless·
@sergical @steipete @openclaw We’re you able to get this to work? I’m trying this now from a fresh install and it seems to be stuck on a lack of auth-profiles?
English
2
0
0
47
Serge 🇺🇦
Serge 🇺🇦@sergical·
I just tried setting this up with aws cli using EC2 instance IAM roles for Bedrock models and it almost worked. If anyone's curious how to set it up github.com/clawdbot/clawd… the key is clawdbot uses env variables to check for bedrock but you can trick it with a default profile and fall back on instance IMDS creds
English
2
0
1
1.1K
cat name | less
cat name | less@catpipeless·
@HackingLZ @m19o__ If they had done that it likely wouldn’t have gotten off the ground or gotten as far. Maybe there was a chance like 2/3 years into it to turn up the heat but still have enough vendor pressure to keep everyone else in.
English
0
0
0
28
Justin Elze
Justin Elze@HackingLZ·
@m19o__ I think everyone knows it was a PR game. I wish MITRE would have put the screws to everyone and made it a challenge but here we are.
English
1
0
10
576
Justin Elze
Justin Elze@HackingLZ·
Nobody is surprised by comments like this
Justin Elze tweet media
English
10
14
132
42.7K
cat name | less
cat name | less@catpipeless·
Principle of least privilege in a GIF
English
0
0
0
118
cat name | less
cat name | less@catpipeless·
@_RastaMouse Hmmm, the last time I tried this the teamserver just kept sending frames and the tcp connection to the external server was reset when I didn’t respond or just resent the previous frames. Changing the sleep in the implant didn’t seem to change this behavior.
English
1
0
0
82
Rasta Mouse
Rasta Mouse@_RastaMouse·
Not sure why, but I suddenly have the urge to write a mini-course on External C2.
Rasta Mouse tweet media
English
11
5
234
26.4K
cat name | less
cat name | less@catpipeless·
@techspence I believe you. But just to be pedantic. That screenshot is rubeus, and I had to submit the sid when I requested the certificate via certify.
English
0
0
1
59
spencer
spencer@techspence·
Has anyone seen this error when attemptin to abuse an ESC1? "KRB_AP_ERR_USER_TO_USER_REQUIRED"
English
10
2
28
5.9K
Christopher Peacock
Christopher Peacock@SecurePeacock·
Some EDRs are now tagging all activity from some BAS solutions with an informational level alert, so everything is detected 👀 100% Detection Coverage! But not really…
English
7
4
32
5.3K
cat name | less retweetledi
Nick Frichette
Nick Frichette@Frichette_n·
A little over a year ago I published research on how you could leverage non-production AWS API endpoints to enumerate permissions without logging to CloudTrail. A year later...I'm still finding them. Red Teamers, these can be super useful and really up your game!
Nick Frichette tweet media
English
2
21
121
7.7K