whiskers 🖤

18.1K posts

whiskers 🖤 banner
whiskers 🖤

whiskers 🖤

@initinfosec

script kitty | chill techie with an OffSec penchant | not l337 | CRTL, OSCP, CISSP, etc. | opinions my own or from /dev/random | he/him/=^_^=

meatspace Katılım Ağustos 2011
2.7K Takip Edilen7.8K Takipçiler
Sabitlenmiş Tweet
whiskers 🖤
whiskers 🖤@initinfosec·
I've only followed a few names there I recognized, but hope to utilize the platform more. Me: @initinfosec" target="_blank" rel="nofollow noopener">infosec.exchange/@initinfosec (thanks @Maliciouslink for admin-ing that instance) 2/2
English
1
2
4
1.3K
whiskers 🖤 retweetledi
Nick VanGilder
Nick VanGilder@nickvangilder·
ZXX
2
14
148
15.3K
whiskers 🖤 retweetledi
5pider
5pider@C5pider·
there is also this list i have saved a while ago where the diff between wininet and winhttp is explained: wininet + proxy -> needs a valid domain user’s token. wininet + SYSTEM -> Bad wininet + service -> bad wininet -> harder to implement verification wininet -> socks4 winhttp + service -> good winhttp + system -> good winhttp + proxy -> HTTP/1.0 proxy issues winhttp -> impersonation support winhttp -> supports kerberos ? Sources: - learn.microsoft.com/en-us/windows/… - cobaltstrike.com/blog/talk-to-y… - docs.metasploit.com/docs/using-met… - learn.microsoft.com/en-us/windows/… - learn.microsoft.com/en-us/windows/…
English
4
29
181
33.2K
whiskers 🖤 retweetledi
gabsmashh
gabsmashh@gabsmashh·
i will be engaging in orange cat behavior today. no, i will not elaborate.
English
49
9
270
9.7K
whiskers 🖤
whiskers 🖤@initinfosec·
created a BSky acct - we'll see how it goes. Same username as here.
English
1
0
4
222
whiskers 🖤
whiskers 🖤@initinfosec·
@sailingbikeruk @fekauff @gabsmashh @bluesky curious Q - is blueSky getting adoption similar to or more than mastadon has for infosec type folks & content? I don't check Mastadon as regularly as I probably should, but adoption & activity seemed a bit stagnant. Is BlueSky any better?
English
2
0
1
18
Ian Davies.
Ian Davies.@sailingbikeruk·
@fekauff @gabsmashh This attitude is preventing people moving. @bluesky is supposed to be a place free from haters and trolls and here you are trolling and hating. I like BlueSky but this hate on twitter and those not yet moved is hugely counterproductive. Do better.
English
1
0
3
131
gabsmashh
gabsmashh@gabsmashh·
ok, but wtf does "lightly encrypted" mean??
English
169
12
343
59.1K
whiskers 🖤
whiskers 🖤@initinfosec·
"Ideas that are hoarded help no one. Success follows generosity." -@JamesClear
English
0
3
4
312
whiskers 🖤 retweetledi
Sam Curry
Sam Curry@samwcyo·
After a really long time only focused on manual web security stuff, almost everything has started to feel like a QA checklist. There are definitely people doing novel research and dropping crazy bugs, but I think a lot of the big stepping stones require people to build really in-depth stuff (like @CharlieEriksen with @WeaselJs). When people talk about burnout, I think a lot of it has to do with the fact that there really isn’t a good narrative to tell yourself after becoming reasonably competent and working for a few years on the hands-on hacking part of security. Let me pick out a team of 3 people and I guarantee you that we could hack pretty much any non-hyper secured target in just a few weeks. Knowing this, it’s a lot less honest to put out work like “we hacked X company” because it’s surprising to no-one who actually does this stuff. It’s getting harder, sure, but it’s still beating the same drum. I think the collective work of everyone in the bug bounty/pentesting game has definitely massively improved security, but as an individual you just aren’t able to report enough individual vulnerabilities to feel good about the work at a sense of purpose level. For that reason, I really think the hacking-adjacent stuff is what really becomes important after being in the weeds for so long. I have really enjoyed seeing my friends start companies, big projects, or switch into roles with more responsibility. If you are feeling kind of burnt out with the everyday hacking, I think it’s important to explore the alternatives. This maybe isn’t super novel and it mirrors how everyone does normal job stuff, but I was stuck in this pit for a better part of this year and think maybe it could help someone. A lot of these thoughts are similar to @gf_256’s Phrack article from earlier this year.
English
24
45
560
69.7K
gabsmashh
gabsmashh@gabsmashh·
every time i go to use a hotel shower, all previous knowledge of how shower controls work instantly leaves my brain forever
English
19
1
157
6.4K
whiskers 🖤 retweetledi
gabsmashh
gabsmashh@gabsmashh·
gabsmashh tweet media
ZXX
37
67
554
34.6K
whiskers 🖤 retweetledi
whiskers 🖤 retweetledi
Justin Elze
Justin Elze@HackingLZ·
All of the red team courses these days, I do wonder if people are being set up for failure. It’s rarely, if ever, an entry level job and continues to become more and more about development/research as the rate at which EDR and other defensive techniques iterate is much quicker than ever before. There are several routes to buying evasive tooling, implants, and other research, but that won’t completely plug the development/research gap long term.
English
21
11
256
60.3K
whiskers 🖤
whiskers 🖤@initinfosec·
"The strategy required to find a great opportunity (lots of saying yes and exploring widely) is different from the strategy required to make the most of a great opportunity (lots of saying no and remaining focused)." -@JamesClear
English
0
0
0
199
whiskers 🖤
whiskers 🖤@initinfosec·
"How to connect with others: Share with someone who wants to listen or listen to someone who wants to share." -@JamesClear
English
0
0
0
285
whiskers 🖤 retweetledi
chompie
chompie@chompie1337·
You don’t FIND exploits. You build them. You FIND vulnerabilities and exploit them. As an exploit developer that has failed to exploit lots of bugs that look good, the distinction is important 😭
English
22
84
725
61.3K
whiskers 🖤
whiskers 🖤@initinfosec·
initinfosec's #PWK / #OSCP survival tips/thoughts. Thread of tips/tricks to hopefully help in PWK/OSCP: caveat emptor: * i'm a scrub, trust but verify? * none are novel/new, YMMV * can only speak to my own exp * in no particular order * added to/updated at random GL;HF 1/x
English
14
33
116
0
whiskers 🖤
whiskers 🖤@initinfosec·
"The reason people get good ideas in the shower is because it's the only time during the day when most people are away from screens long enough to think clearly. The lesson is not to take more showers, but rather to make more time to think." -@JamesClear
English
0
1
2
297
Nick Frichette
Nick Frichette@Frichette_n·
Today is an interesting day! I read a report about a threat actor, and for once I'm impressed! This is the first I can remember in which a TA has displayed NEW tradecraft, before researchers have shared it widely. Let's review in this 🧵 invictus-ir.com/news/the-curio…
English
10
76
261
55.7K
Nikhil Mittal
Nikhil Mittal@nikhil_mitt·
I am giving away 1 seat each for our upcoming bootcamps. Azure Cloud Attacks (CARTP) - 3rd Feb (9:00 AM ET) Active Directory Attacks (CRTP) - 4th Feb (9:00 AM ET) Please Reply, Like and Repost to participate. The winners will be announced on Friday 2nd Feb 2024. alteredsecurity.com/bootcamps #Azure #Redteam #Pentesting
Nikhil Mittal tweet mediaNikhil Mittal tweet media
English
323
353
524
63K