l1quid-

3K posts

l1quid- banner
l1quid-

l1quid-

@mpbailey1911

hey kids, ima computa!

Richmond, VA Katılım Mart 2008
2.7K Takip Edilen1.6K Takipçiler
l1quid- retweetledi
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Pentester who just resends last year’s report 🤝 Client who didn’t even notice cause they know they didn’t fix shit
English
19
17
469
14.1K
l1quid- retweetledi
Bad Sector Labs
Bad Sector Labs@badsectorlabs·
🏟️ Ludus launched 2 years ago and the community embraced and extended it with write-ups, roles, configs, and environments. We're excited to see what you build with Ludus 2! (1/4)
English
3
20
79
6.9K
l1quid- retweetledi
Tyler Rogoway
Tyler Rogoway@Aviation_Intel·
What Cops Saw Chasing Down New Jersey Drones A large tranche of never-before published documents provides insights into what law enforcement saw in the skies during the drone scare of 2024. twz.com/air/what-cops-…
English
22
90
511
65.7K
Ellie Huxtable
Ellie Huxtable@ellie_huxtable·
Does anyone have any cool blogs they follow? Updating my feed reader with new stuff, what should I add?
English
9
3
22
5.8K
l1quid- retweetledi
National Park Service
National Park Service@NatlParkService·
If Monday after daylight saving had a face…
National Park Service tweet media
English
101
1.8K
12.4K
192.7K
l1quid- retweetledi
Richard Johnson
Richard Johnson@richinseattle·
Spread the word! @phrack CFP with demoscene cracktro is live. Turn up the volume and enjoy the awesome stylings of @PiotrBania with some hopefully inspiring text from phrack staff :) phrack.org
Richard Johnson tweet media
English
6
134
251
38.4K
l1quid- retweetledi
Rob Fuller
Rob Fuller@mubix·
“You either die a hero or live long enough to become a vendor” — @hackeroats
English
5
6
59
3.9K
l1quid- retweetledi
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
There’s an astronomical skill gap between good security people, and the rest. There’s no mid. Accounts you see posting their research here are absolutely cracked, it’s not the norm. When you go out and talk to security folks that don’t go to conferences, don’t read up on research, you realize- holy shit. They have no fucking clue. The majority of the cybersecurity work force is absolutely incompetent. It’s partly why vendors can come up with inane bullshit as marketing material and it works on many CISOs. If you’re reading this, you’re most likely 1000x the skill level of the average person. Like I cannot emphasize enough how low the bar is when the sample size is the entire industry.
English
147
96
1.6K
173.2K
l1quid- retweetledi
Andy Gill
Andy Gill@ZephrFish·
github.com/ZephrFish/ludu… ludus template to build an AD CS attack lab which is a snippet from my course (lms.zsec.red) with the addition of pre-reqs for MDE/MDI deployment and windows hardening, you can drop in replace this for elastic too
English
0
16
78
2.9K
l1quid- retweetledi
MatheuZ
MatheuZ@MatheuzSecurity·
Linux Rootkit Competition — tmp.out #5 Rootkits may target userland, kernel space, or use hybrid approaches. Categories: * Stealth / Detection Evasion * Persistence * Complexity * Obfuscation * Novelty / Ingenuity #linux #rootkits #tmpout
MatheuZ tweet media
English
1
33
127
7.5K
l1quid- retweetledi
Daniel Cuthbert
Daniel Cuthbert@dcuthbert·
Everyone today is a hacker in a sense but there are very few OG hackers on which shoulders we stand Oh dude, Felix “FX” Lindner you were so much a hackers hacker and you will be missed RIP my friend and thank you
Daniel Cuthbert tweet media
English
51
134
583
76.4K
l1quid- retweetledi
Hamid Kashfi
Hamid Kashfi@hkashfi·
Finally got some breathing room, so here's a quick recap of the cyber side of IR/US ongoing war: 1. Right after the first strikes by US, within the first hours, multiple popular (pro regime) news agencies and outlets were compromised at the same time. Legitimate looking news contents were injected to the front page, aimed at degrading morale of pro-regime force by typical PSYOPS tactics. Sites were quickly taken down and restored. 2. Shortly after that, BadeSabaa (Prayer time app), a popular mobile app with 30+ Million installations (from Iranian app store) was hijacked and used to send push notifications to users. This time the target audience was mostly army members, calling them to surrender and join the people, if they want to survive. This app is an interesting pick, not just because it has a high number of downloads. Users of the app are particularly religious people and have higher chance to be also pro-regime and within body of the army. One important but seemingly ignored fact about this app is that it requests location access to operate. It's safe to assume most users allow that for more accurate prayer time results. It's also safe to assume that, if the app backend is compromised enough to allow sending push notifications, it's safe to assume that any telemetry logs and data from the app would be also compromised. Correlating telemetry with unique device ID for that large user base can be (ab)used in many different and interesting ways! Not that it has been the case. * Rumors circulated that EITAA, an Iranian popular messaging app, was also taken down and no longer accessible. That turned out to be just a rumor as I verified. 3. Iran internet went in full blackout mode again. Not that this had anything to do with a cyber operation. Initially starting from MCI and expanding to the entire country within a day. Like in previous case, there are still a small fraction of hosts that remain accessible from outside, but if you have been logging previous round's data and compare it with current one, you might notice interesting discrepancies ;) This is likely a multi-reason effort to contain exposure of impact of strikes, possible denial of service to smaller drones (which turned out a failed assumption and attempt during IR/IL war too) and finally to have a veil over any potential aggression towards upcoming unrests and protests by people in the streets. 4. During second day of strikes, Iranian national TV's Channel 3 satellite streams (IntelSat) were hijacked (2nd time since recent protests) and videos of Trump and Netanyahu speeches were broadcasted instead. Again, expected PSYOPS move considering the situation. Other covert operations have been also in progress, which I guess we might be hearing about them (or not) in near future. I will be occasionally updating this as a thread, if more notable cyber attacks takes place.
English
12
132
630
112.9K
l1quid- retweetledi
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
“How should cybersecurity companies do marketing?” Just look at @HuntressLabs and @ThinkstCanary: - hire fantastic people - publish blog posts to show off real, nuanced research - no theatrical clickbait bs - don’t put lamp shades on heads - word of mouth does the rest
English
30
47
437
25.5K
l1quid- retweetledi
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
AI is NOT replacing cybersecurity jobs. Full stop. I'm so tired of people parroting "AI will replace reverse engineers" and "malware analysis is solved". No. It is not. I have analyzed hundreds of malware samples using AI. Here's what actually happens: -> It gives you made-up decryption keys with full confidence -> It tries to decrypt data that is literally random garbage -> It misidentifies malware families -> It misses critical functions And have you ever tried retrohunting with the YARA rules AI writes across thousands of samples? Go ahead. Watch the false positives roll in. That alone should tell you everything you need to know. Every single output needs human validation and rigorous review. AI is a tool, a powerful one. But someone still has to build the MCPs, validate the output, understand the context, catch the hallucinations, and make the actual calls during incident response. The people saying this stuff loudest have clearly never watched AI confidently hand them completely wrong decrypted data and make them believe it's real. Stop scaring newcomers out of the field and misleading people with this nonsense. Cybersecurity still needs humans.
English
82
115
762
55.4K
Justin Elze
Justin Elze@HackingLZ·
Nothing is as entertaining as running "Find all the security issues" on the same codebase over and over and getting different results each time.
English
24
8
282
13.8K
l1quid- retweetledi
Jason Lang
Jason Lang@curi0usJack·
Real imposters don't get imposter syndrome. You're fine.
English
7
18
99
6K
l1quid- retweetledi
Can Vardar
Can Vardar@icanvardar·
we desperately need a new season of silicon valley. the ai era alone would carry 3 seasons
Can Vardar tweet media
English
536
1.1K
17.2K
1.5M
l1quid- retweetledi
sudox
sudox@kmcnam1·
sudox tweet media
ZXX
23
164
4.1K
27.6K