Jono

1K posts

Jono banner
Jono

Jono

@katechondic

Sitting in a dark room with Ghidra open - dungeons & dragons. Not on Twitter xx

有名,有钱,容易 Katılım Şubat 2019
612 Takip Edilen585 Takipçiler
Sabitlenmiş Tweet
Jono
Jono@katechondic·
My next video on introducing dynamic analysis is finally done and ready for viewing! It's uhh...a little long, but I hope you can squeeze as much content out of it as possible :) youtu.be/Gg8p00kXk6Y
YouTube video
YouTube
English
0
2
10
1.2K
Jono retweetledi
Adam
Adam@malworms·
For anyone using Binary Ninja and wanting to use Mandiant's ShellcodeHashes IDA plugin-I ported a basic version of the IDA plugin to Binary Ninja: github.com/PwCUK-CTO/Bina… Known limitations - No GUI, no support for searching memory constants - but it works well for most use cases
English
0
10
25
2.2K
Jono retweetledi
allthingsida
allthingsida@allthingsida·
Here are my slides for REcon 2024 talk entitled: “A Tale of Reverse Engineering 1001 GPTs: The good, the bad And the ugly” github.com/0xeb/TheBigPro… Beware of your IP address being leaked when using custom GPTs.
English
0
64
181
18.1K
Jono
Jono@katechondic·
Wanted to use this platform (for once) to say @SLEUTHCON is definitively a conference worth being a part of for both the community it has created, and the incredible team of down to earth and excellent organisers (@DPM_Chris, @JohnHultquist, @sherrod_im are just a few)
English
1
4
22
2.4K
Jono
Jono@katechondic·
If anyone deserves the praise for the success of Sleuthcon it’s you and your wife; truly just endlessly professional and accommodating, better producers you could not find anywhere - thank you for everything guys
Chris Peterson@cyberconchris

@katechondic was a freakin’ gem. 10/10 would recommend

English
1
0
12
525
Jono retweetledi
SLEUTHCON
SLEUTHCON@SLEUTHCON·
Power remains out and we are limping along. We are recording talks and will get them to virtual attendees ASAP! Watch here for updates.
SLEUTHCON tweet media
English
5
4
38
4.3K
Jono
Jono@katechondic·
@s0urcesmeth0ds @SLEUTHCON A biggest hype woman could not be found anywhere - you’re the best dude thank you so much; can’t wait to have you here in person so we can dream team a con at some point ❤️
English
0
0
2
120
Jono
Jono@katechondic·
@RyanW3stman Wow Ryan, this means a whole lot; thanks a bunch! Thanks for sticking with me, and shoutout to @SLEUTHCON folks for handling this like champs, nerves of steel in the DMV!!
English
0
0
1
67
Jono retweetledi
Ryan Westman
Ryan Westman@RyanW3stman·
@katechondic without question one of the best talks I’ve ever seen at a conference. I would have quit after not being able to get my slides rolling. #sleuthcon
English
2
2
5
1.2K
Jono
Jono@katechondic·
@pewpew_lazors For $50, you can (This is what expenses were made for!!)
English
0
0
0
72
Jono
Jono@katechondic·
I am 100% not this attractive in real life, but nonetheless very excited to represent the PwC Threat Intelligence team and the badass work done by each and every one of my team at this year’s #SLEUTHCON - let’s GO
Jono tweet media
English
1
7
30
5.8K
Jono retweetledi
inversecos
inversecos@inversecos·
APT Emulation Labs: NOW LIVE 🎉 Solve incidents emulating APT29, APT10 and other threat groups. $45 per month access to ALL labs: 👀 150+ hours of lab content 👀 Disk forensics + ELK logs 👀 Hints, questions and point system 👀 7 days free trial Labs are created & designed by industry peers: @ZephrFish @svch0st @ippsec @DebugPrivilege @HuskyHacksMK @inversecos Each lab comes with scoping notes, Windows VM with forensic tools, network diagrams, disk forensics, ELK access and was created from our collective experience working in the field. 👇ACCESS THE LABS HERE 👇 xintra.org/labs
English
26
252
959
330K
Jono retweetledi
Daniel Lunghi
Daniel Lunghi@thehellu·
Our latest report on a CN #APT targeting tens of governments entities worldwide has been published 🥳 After monitoring it for a long time we realized it is likely related to the recent I-Soon company leaks. It discusses their TTPs and provides lots of IOCs trendmicro.com/en_us/research…
Daniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet media
English
1
47
111
14.6K
Jono retweetledi
vx-underground
vx-underground@vxunderground·
Today was a big day for the United States government and United Kingdom government. The Federal Bureau of Investigation and U.K. National Crime Agency’s (NCA) Cyber Division unveiled a massive, multi-year long investigation which has led to a catastrophic blow to Lockbit ransomware group and affiliates. The Lockbit ransomware group Tor domain name displays a list of posts announcing activity performed by law enforcement agencies. It is written in Lockbit format, illustrating they have full control over Lockbit ransomware groups infrastructure. Law enforcement has done the following 1. Law enforcement agencies will be unveiling sensitive information on Lockbit cryptocurrency and money operations February 23th, 2024 2. Law enforcement, with SecureWorks, will be revealing information on Lockbit tradecraft February 22nd, 2024 3. Law enforcement will be unveiling Lockbit affiliate infrastructure February 21st, 2024 4. Law enforcement, with TrendMicro, will be releasing a detailed analysis on Lockbit future-iterations February 22nd, 2024 5. Law enforcement will be unveiling information on Lockbit's StealBit data exfiltration tool February 21st, 2024 6. Law enforcement will be unveiling sanctions on Lockbit ransomware group at 15:30UTC today 7. Law enforcement, in conjunction with Japanese partners, has released a Lockbit decryptor tool 8. An individual in Poland has been arrested 9. An individual in Ukraine has been arrested 10. Law enforcement plans on unveiling the identity of the Lockbit ransomware group administration February 23rd, 2024 11. The United States government unveiled the indictement of two individuals associated with Lockbit ransomware group: Artur Sungatov and Ivan Kondratyev 12. The United Kingdom NCA has unveiled sensitive information on the Lockbit backend: the administration panel, the blog backend, and the blog source functionality. This includes the images of the source code.
vx-underground tweet media
English
36
400
2.1K
210.1K