Matt Monte

116 posts

Matt Monte

Matt Monte

@networkattack

Author of Network Attacks and Exploitation: A Framework

Katılım Ağustos 2015
121 Takip Edilen625 Takipçiler
Chris Williams
Chris Williams@HawaiiFive0day·
Well… Guess I’m buying three copies of @networkattack’s book… again (they’re great gifts for people entering the industry)
Chris Williams tweet media
English
1
0
0
291
Matt Monte
Matt Monte@networkattack·
@haxrob @ImposeCost Re: chopper. I’d argue it still fits the mold. The dev and deploy costs are essentially zero at this point, so it doesn’t matter from their perspective if caught
English
0
0
0
0
Matt Monte
Matt Monte@networkattack·
@haxrob @ImposeCost First, thx for reading. The hope was always to get ppl thinking, so I truly appreciate small/big disagreement.
English
2
0
1
0
HaxRob
HaxRob@haxrob·
“Network Attacks and Exploitation - A framework” feels unique in the sense that it breaks down concepts into particularly theoretical terms while not remaining too dry. I haven’t yet come across other books quite like it.
HaxRob tweet media
English
1
2
3
0
Matt Monte
Matt Monte@networkattack·
@0xAlexei I wanted to use what I now use as a twitter icon (purchased use rights on it just for that reason) with a lead title of “0wn3d” but publisher suggested it could hurt sales, esp for anyone not familiar with 1337.
English
0
0
1
0
Matt Monte retweetledi
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
One thing that @networkattack points out is that anything that can be done by authorised users can be done by hackers abusing authorised users’ access.
English
1
18
46
0
@1njection@infosec.exchange
@[email protected]@1njection·
Hey all, I wanted to do a belated #infosec #FF to celebrate a bunch of the talented hackers I mention throughout my book. We are all standing on the shoulders of others in the Comp Sci field, so it’s important to recognize the work of others around you.
English
2
8
65
0
Matt Monte
Matt Monte@networkattack·
@Jackson_T One of the key ?’s that got me writing in the first place was “what principles should underly policy?” Glad you found the book useful.
English
0
0
1
0
Jackson T.
Jackson T.@Jackson_T·
Using principles from @networkattack's CNE framework (as an example), we can develop "tradecraft policies" to represent various engagement types. These can be used to cross-check our intuition and defend the decisions we make with reasons.
Jackson T. tweet media
English
2
0
5
0
Jackson T.
Jackson T.@Jackson_T·
Thank you for attending my @x33fcon talk on using OODA loops to evade EDRs. Slides and write-up are available here: jackson-t.ca/ooda-loops.html. For those that missed it or want a lossy recap, check out the thread below. 🧵👇 (1/12)
Jackson T. tweet media
English
5
85
188
0
Matthew Conway
Matthew Conway@svcghost·
Currently reading @networkattack's _Network Attacks and Exploitation: A Framework_ and I can't put it down. I fell asleep reading it last night. Hat tip to @Jackson_T for cluing me into this book I somehow missed until this week 🙇‍♂️
English
1
0
3
0
Matthew Conway
Matthew Conway@svcghost·
I was summoned for jury duty today, and as with every other time that's happened to me, I didn't have to show up 😎 Instead, I've been sitting in the sun reading all day and it's been great
English
1
0
1
0
Matt Monte
Matt Monte@networkattack·
Great discussion. I appreciate how @rejectionking and @jfslowik consider the timescales involved in attacker/defender initiative.
English
0
0
4
0
Matt Monte
Matt Monte@networkattack·
@swagitda_ Strategic and goals oriented mindset vs. tactical
English
0
0
0
0
Kelly Shortridge
Kelly Shortridge@swagitda_·
Every breach, we inevitably see this kind of hindsight bias (and/or outcome bias) and failure to comprehend complex systems. Attackers think in systems, but defenders think in components. This is why the market for a single root cause festers alongside that for silver bullets.
thaddeus e. grugq@thegrugq

“The offense is routinely underestimated. When companies are hacked, they react as if they had only done this one thing or avoided this one mistake everything would have been okay. The adversary is treated as if they just got lucky.” —@networkattack

English
5
10
79
0
Adam Kujawa
Adam Kujawa@Kujman5000·
@thegrugq @networkattack I think it depends on the adversary. There are some groups which lean on the luck component, searching for a vuln, hoping someone clicks on a link, and there are a LOT more of them. You're right though, hubris in a single solution or entry method is a quick way to get breached.
English
1
0
0
0
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
The SolarWind backdoor was deeply integrated into the code, it was injected during their build process, and there is no way that the update server having a weak password was the pivotal factor. Like Russian Intelligence would just give up if there were a strong password instead!
English
11
120
557
0
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
@gannimo @gamozolabs Those (OPSEC etc) are drivers for using 0day over phishing. It is fairly unlikely you’d want to defend forward with phishing attacks. I doubt the GRU gets hacked with email attachments! ;)
English
2
0
4
0
Brandon Falk
Brandon Falk@gamozolabs·
What's something about security research that you wish you knew more about?
English
34
17
129
0
Matt Monte retweetledi
Runa Sandvik
Runa Sandvik@runasand·
In the series of “books I wish I’d read sooner” is @networkattack’s Network Attacks and Exploitation: A Framework. I really appreciate the solid examples and the focus on humanity throughout. amazon.com/Network-Attack…
English
2
12
70
0
Matt Monte
Matt Monte@networkattack·
@3141592f @runasand Starter? Usually on planes if I say “I do computer stuff” it’s a convo ender.
English
0
0
1
0
Matt Monte
Matt Monte@networkattack·
@runasand @RossleRed I reasoned that if someone were going to steal a car, they would steal a better car than mine... The “better car” theory of security breaks down when attacks can be automated and there is a potential positional use for every point of access.2/2
English
0
0
0
0
Matt Monte
Matt Monte@networkattack·
@runasand @RossleRed Context: [C]ompanies do not believe they will be targeted because they are uninteresting... I used exactly this thought process for deciding never to bother locking the doors of my first car, a machine held together by coat hangers, duct tape...1/2
English
1
1
1
0