Investigator515

4.5K posts

Investigator515 banner
Investigator515

Investigator515

@inv515

Investigator | Wireless Security Researcher | Writer | Software Defined Radio

🦋 🦋 🦋 Katılım Şubat 2023
1.1K Takip Edilen1.2K Takipçiler
Sabitlenmiş Tweet
Investigator515
Investigator515@inv515·
One of my fav 🇺🇦 causes is the Humanitarian Demining project co-ordinated by @U24_gov_ua It helps fund aid & equipment that's organised by an official gov't organisation. Support this vitally important work + know your donations made a difference u24.gov.ua
English
1
8
7
2K
Investigator515 retweetledi
Alphabet Soup 👑
Alphabet Soup 👑@Alph4betSoup·
Wrote a little thing: Identifying Bot Accounts on Twitter; Why It Matters and What You Can Do About It @ItsNotNicole/identifying-bot-accounts-on-twitter-why-it-matters-and-what-you-can-do-about-it-2b6f447ad1ae" target="_blank" rel="nofollow noopener">medium.com/@ItsNotNicole/…
English
6
7
30
899
Cthulhu ( ;,;)
Cthulhu ( ;,;)@Cthulhu_Answers·
Another good example of this platform descending further into oblivion. @UK_Daniel_Card had his account suspended for posting a CVE, obviously there has been malicious reporting.
Cthulhu ( ;,;) tweet media
English
23
24
144
4.3K
Investigator515 retweetledi
Australian Signals Directorate
In Star Wars, almost every major breach came down to misplaced trust. Remember, access to the Empire shouldn’t be granted just because someone looks like a stormtrooper. Zero Trust means no clones, no shortcuts, no assumptions. #StarWarsDay #MayThe4thBeWithYou
Australian Signals Directorate tweet media
English
3
6
26
955
Investigator515
Investigator515@inv515·
@akses_0x00 The Phantom 3 went EOL with a firmware upgrade that bricked the ESC controllers for the motors. Unofficially, of course.
English
0
0
1
8
ɐʞsǝs
ɐʞsǝs@akses_0x00·
@inv515 Oh I had no idea they were in this camp. That is terrible to see :(
English
1
0
1
6
ɐʞsǝs
ɐʞsǝs@akses_0x00·
You know what sucks? Hardware manufacturers that go to extreme lengths to brick your devices when they no longer want to support them. Some will attempt to literally self-destruct if you attempt to find ways to load custom firmware on them. This might seem trivial at first until you consider this contributes in part to the massive e-waste problem we have as a species Approximately 80% of it is never properly dealt with, leaving perhaps $50-100B USD of unused resources lying around doing nothing. We were taught as kids "Reduce > Reuse > Recycle" and these companies deny us the ability to do the first two, leaving the last option as the only one.
English
2
0
9
215
Investigator515 retweetledi
sudox
sudox@kmcnam1·
sudox tweet media
ZXX
13
95
575
8.8K
Investigator515 retweetledi
Andrew Morris (afk)
Andrew Morris (afk)@Andrew___Morris·
Howdy folks! Taking a break from my twitter break to let yall know that we released a new @GreyNoiseIO product yesterday. It's called Project Swarm. We've been quietly not-so-quietly working on it for a few years. You can buy it now. It costs $1. There are lots of vulnerabilities on edge-facing apps. To catch in-the-wild exploitation of them, we @ GreyNoise run sensors on the internet. New AI models means more vulnerabilities being identified and exploited, and FASTER. Long term, software and hardware will probably get better, but in the meantime we're gonna have to deal with A LOT of vulnerabilities. At GreyNoise, the sensors we run are basically honeypots- we bait attackers to scan and exploit them which enables us to learn where the attackers are, which vulnerabilities they are exploiting, what it drops, and what it looks like on the wire. From ~2020-now it took us years to build up our fleet. Now anyone can use our new product to deploy their own sensors on their own networks, or an entire fleet of any size, in a day. You can rip back the data and do whatever you want with it. You can resell it, put it into your product, or just stare at it- whatever you want! On our side, we aggregate the data and pour it into a community dataset that everyone shares. As more people join, the data gets bigger and better. Couple neat features: - Sensor deployment is a single bash command on any modern linux distro that supports iptables and wireguard. - Sensors and vulnerable software (profiles) are abstracted into different logical concepts, which means the "what" and "where" are different things, and the sensor is not constrained by the compute required to run the vulnerable software. Also, no matter how hacked the profile (honeypot) gets, it can't touch your host sensor or the rest of your network. - Sensors can run fake honeypots, real software, or even real hardware (bridged with a raspberry pi) like old crappy routers and modems (or expensive firewalls and VPN gateways 👀) - You can create dynamic blocklists that block IPs sourced from your own sensors in real time, so if a remote IP address *looks at your network* the wrong way, you block them instantly. - All the PCAP data is available to you in a gorgeous and intuitive interface at near real time and fully enriched against all of our (thousands of) rules. We're working on the host metadata (malware, syscalls, host behaviors) as well, but this will come later. - If we don't tag a CVE that's interesting to you, you can write a Suricata rule to tag it yourself once and your data gets tagged with it in real time forever. - You can instantly download PCAPs of any exploits that hit your sensors. - If you don't want your data shared with the community dataset, you can talk to our team and we'll work out rights to make it private. Check it out! There's a lot of moving pieces to make this work and we expect bugs, but it's available right now. Join the fight! greynoise.io/project-swarm
Andrew Morris (afk) tweet mediaAndrew Morris (afk) tweet mediaAndrew Morris (afk) tweet mediaAndrew Morris (afk) tweet media
English
13
83
351
34.7K
Investigator515 retweetledi
solst/ICE of Astarte
This is a big deal & huge inspiration to me, and I will tell you why: In fall 2024 I started looking into chrome extensions, but nobody gave a shit back then. I asked around on a few Slacks, and the name @tuckner kept popping up. I reached out to John and realized: this guy knew his shit, way ahead of the curve, and had started building a whole ass tool to monitor chrome extensions. He had quit his job for it, went all-in. You’d think, oh, ofc he’ll go for VC funding and join the circlejerk of marketing psychopaths. Nono, John did it completely alone, no boss, no delusional VC to appease. Instead of deceitful marketing blog posts, he worked on his tool and did his own research, uncovering real malware campaigns, and becoming an authority for detection in the extension ecosystem. But it wasn’t enough to stick to browsers. What else is out there posing the same risks? He dove into different browser marketplaces, then IDE extensions. Nobody else had publicly made that connection, and went for it, understanding the ecosystem, building technical controls and detections, integrating them into a web app, while doing his own outreach and client success management, all completely solo. So it makes complete sense to me that he’d get acquired (within 1.5 yrs!!) and Socket being obsessed with third party dependencies seems like an ideal match. But most of all, his story is incredibly inspiring to me because it proves: you don’t need anyone to tell you shit. You don’t need VC slides with a made up gtm strategy. You DO NOT need an AI generated launch video. You just need to be passionate and willing to do your own research. The work will speak for itself. And the legit folks will see the vision.
tuckner@tuckner

Today we're announcing that @secureannex has been acquired by @SocketSecurity! Supply chain security is a deceptively wide problem from open source code to browser extensions. Developers and IT teams can't stop it from impacting their organization alone. secureannex.com/blog/annex-acq…

English
12
22
131
15.3K
iShowCybersecurity
iShowCybersecurity@ishowcybersec·
I’m creating a private group for Cybersecurity Content Creators on X. The goal is simple: Help each other grow, share knowledge, & amplify content that actually helps people stay secure. We grow together. We support each other. Comment or DM if you want to join.
English
280
26
476
22.7K
Investigator515 retweetledi
OccupytheWeb
OccupytheWeb@three_cube·
In these tumultuous and dangerous times, a meshtastic network that provides Internet connection may be precisely what you need! hackers-arise.com/off-grid-commu…
OccupytheWeb tweet media
English
4
14
90
2.7K
Happy Captain
Happy Captain@EODHappyCaptain·
So like… This is a really bad idea. Don’t do this.
English
215
100
2.3K
671.9K