Jason Ostrom

227 posts

Jason Ostrom banner
Jason Ostrom

Jason Ostrom

@securitypuck

Instructor and Author @SANSInstitute | Blue & Red Team | GoLang & Terraform| Builder of things | Husband & Father | #NHL #NFL | @[email protected]

Phoenix, AZ Entrou em Ağustos 2008
286 Seguindo978 Seguidores
Tweet fixado
Jason Ostrom
Jason Ostrom@securitypuck·
I’m super pumped to release v1.0 of my free Azure security tool (PurpleCloud) in the hopes that it will be useful to the InfoSec community evolving the so called “Purple Teaming” in the cloud! Website: purplecloud.network
English
9
89
357
0
Jason Ostrom retweetou
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
📣 Registration is OPEN for Hack & Defend Summit! Join @Steph3nSim & @SecHubb on Oct 28-29 in Austin, TX, when Red & Blue unite to learn from each other, build better strategies, & create stronger defenses against real-world threats. ➡️ Learn More: sans.org/u/1AWB
SANS Offensive Operations tweet media
English
0
7
13
1.9K
Jason Ostrom
Jason Ostrom@securitypuck·
@fabian_bader @derdanu Very nice little web app tool. FYI, I coded a golang binary cli tool that hits the same Azure IP ranges endpoint. Good for a detection engineering enrichment for performant lookups at scale, single IP address, or large list. Supports multiple cloud providers and services.
Jason Ostrom tweet mediaJason Ostrom tweet media
English
1
0
1
60
Jason Ostrom
Jason Ostrom@securitypuck·
@mosesrenegade @fabian_bader Very interesting little tool. Edge already gathers all Azure IP ranges from the same endpoint. It's just a CLI tool for performant lookups at scale, single IP address or a large list.
English
0
0
0
18
Jason Ostrom
Jason Ostrom@securitypuck·
You can run injects of user behavior and create the telemetry that will make your training very realistic. "GHOSTS Playground" is released under a permissive MIT license, allowing you control over what you do with it. Roll up your sleeves and check it out! PRs welcome and the docs show you how to customize.
English
0
0
0
114
Jason Ostrom
Jason Ostrom@securitypuck·
Use this to conduct your own research for building out NPCs using LLMs. Build your own pentest learning lab, or use it to create a Purple Teaming lab or class. I've focused on the API and building out three options to use the NPC endpoints.
English
1
0
0
136
Jason Ostrom
Jason Ostrom@securitypuck·
@pwnEIP That’s awesome. I remember our adventures. You teaching?
English
0
0
0
51
Jason Ostrom retweetou
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
In this modern age, battles are fought on many fronts. In Chapter 1 of the Aviata Cloud Solo Flight Challenge workshop series, @mosesrenegade will show you how to look at a target organization's misconfigured public items, and more. ✍️ Register now: sans.org/u/1uWv
SANS Offensive Operations tweet media
English
0
3
1
1.7K
rootsecdev
rootsecdev@rootsecdev·
Unfortunately the link expired to this old @SANSInstitute workshop. Would be super awesome if someone over at SANS posted the ova again or hosted a new free workshop to get folks interested in offensive cloud ops. That would be awesome 😎
rootsecdev@rootsecdev

If you do have a M365 dev tenant and want to get started with building out labs for red teams. Highly recommend this SANS free on demand course. SANS Workshop – Building an Azure Pentest Lab for Red Teams sans.org/webcasts/sans-…

English
5
5
48
9.8K
Jason Ostrom
Jason Ostrom@securitypuck·
@rootsecdev Hey saw your note over to @mosesrenegade . Believe it or not, I had that lab permanently hosted on a site and accidentally deleted it. Let me see if I can bring it back up soon. There was a workbook for it. I'll also ping SANS to see if they can bring back the OVA link.
English
0
0
4
475
rootsecdev
rootsecdev@rootsecdev·
If you do have a M365 dev tenant and want to get started with building out labs for red teams. Highly recommend this SANS free on demand course. SANS Workshop – Building an Azure Pentest Lab for Red Teams sans.org/webcasts/sans-…
English
3
61
257
32.9K
Jason Ostrom
Jason Ostrom@securitypuck·
Changes: * Added TLS hosting with new Caldera 5.0 VueJS app. Fixed an issue missing in Caldera docs preventing remote hosting. * Verified proper API for sending abilities against an agent. Added to terraform cheat sheet. * Removed Prelude Operator
English
1
0
1
160
Jason Ostrom
Jason Ostrom@securitypuck·
Just released an update to my Adversary-as-Code automated security lab. But seriously :-). Updated to latest Caldera 5.0 update. Added API cheat sheet in terraform for sending abilities. Been playing with sending techniques over an API, lots of potential here for automation + offensive security engineering...#mitre #purpleteaming
English
1
2
8
620