Inf0secRabbit's profile picture. Threat research @Crowdstrike | Ex-Red Team @Mandiant | Profession is passion :) | Tweets are all mine

inf0secRabbit

@Inf0secRabbit

Threat research @Crowdstrike | Ex-Red Team @Mandiant | Profession is passion :) | Tweets are all mine

inf0secRabbit reposted

In @33y0re's latest post on Windows ARM64 Pointer Authentication, he dissects how PAC fortifies stack integrity and thwarts exploits at the hardware level. Explore the mechanics of this critical security layer and its role in modern Windows defenses. preludesecurity.com/blog/windows-a…


inf0secRabbit reposted

I won, and everybody is happy Thank you! Obrigado! Lets celebrate #UFCRio


inf0secRabbit reposted

I’ve been discovering Reverse Engineering tools and techniques by following IDA Pro plugin updates, which I publish via RSS. Daily, a script searches GitHub for IDA API names that suggest a project uses IDA. Then it renders recent releases and commits. williballenthin.com/ida/plugins/ac…

williballenthin's tweet image. I’ve been discovering Reverse Engineering tools and techniques by following IDA Pro plugin updates, which I publish via RSS. 

Daily, a script searches GitHub for IDA API names that suggest a project uses IDA. Then it renders recent releases and commits. 

williballenthin.com/ida/plugins/ac…

inf0secRabbit reposted

Thanks to everyone who joined my DEFCON33 talk!🎉 For those of you who missed it and are interested in seeing how we can extract cleartext credentials and bypass MFA directly from the official Microsoft login page, I just uploaded the recording to YouTube: youtu.be/z6GJqrkL0S0

RedByte1337's tweet image. Thanks to everyone who joined my DEFCON33 talk!🎉
For those of you who missed it and are interested in seeing how we can extract cleartext credentials and bypass MFA directly from the official Microsoft login page, I just uploaded the recording to YouTube:
youtu.be/z6GJqrkL0S0

inf0secRabbit reposted

Dumping the NTDS.dit from disk - A new NetExec module💾 Isn't it super annoying when AV blocks your access to the SAM/SYSTEM hives? The new "ntds_dump_raw" module made by @0xcc00 parses the disk image directly, allowing you to extract the NTDS.dit or SAM database🚀

al3x_n3ff's tweet image. Dumping the NTDS.dit from disk - A new NetExec module💾

Isn't it super annoying when AV blocks your access to the SAM/SYSTEM hives?
The new "ntds_dump_raw" module made by @0xcc00 parses the disk image directly, allowing you to extract the NTDS.dit or SAM database🚀

inf0secRabbit reposted

Congratulations, Dustin. You’re truly one of the greatest to ever step into the cage. It was an honor and a privilege to share it with you

MAKHACHEVMMA's tweet image. Congratulations, Dustin. You’re truly one of the greatest to ever step into the cage. It was an honor and a privilege to share it with you

inf0secRabbit reposted

From the favelas to the world. He was never supposed to make it this far, sick as a kid, counted out always, 10-8 start to his UFC career. Win or lose, his story already inspired millions. We love you, Charles. ❤️

Full_Violence's tweet image. From the favelas to the world. He was never supposed to make it this far, sick as a kid, counted out always, 10-8 start to his UFC career. Win or lose, his story already inspired millions. We love you, Charles. ❤️

inf0secRabbit reposted

Time to become a double champion #inshaAllah Let’s go


inf0secRabbit reposted

Jose Aldo has announced his retirement from MMA after #UFC315. One of the greatest of all time 👏

espnmma's tweet image. Jose Aldo has announced his retirement from MMA after #UFC315.

One of the greatest of all time 👏

inf0secRabbit reposted

📣 Today we are excited to launch #CrowdStrike Insider Risk Services to help organizations anticipate, detect and respond to insider threats. Full details: crwdstr.ke/6014aZPQE


inf0secRabbit reposted

"What does this title represent? It means you're the best in the world and if you're the best in the world, it doesn't matter who's going to be standing across from you. What do I say? No? NEVER. Let's do this!"

MAKHACHEVMMA's tweet image. "What does this title represent? It means you're the best in the world and if you're the best in the world, it doesn't matter who's going to be standing across from you. What do I say? No? NEVER. Let's do this!"
MAKHACHEVMMA's tweet image. "What does this title represent? It means you're the best in the world and if you're the best in the world, it doesn't matter who's going to be standing across from you. What do I say? No? NEVER. Let's do this!"

inf0secRabbit reposted

💡 Today we are unveiling a new China-nexus adversary: LIMINAL PANDA. 👉 Our blog post contains deeper insights into LIMINAL PANDA’s operational profile and key TTPs, as well as guidance for organizations to defend against this sophisticated adversary: crwdstr.ke/6010sUQwM

CrowdStrike's tweet image. 💡 Today we are unveiling a new China-nexus adversary: LIMINAL PANDA.

👉 Our blog post contains deeper insights into LIMINAL PANDA’s operational profile and key TTPs, as well as guidance for organizations to defend against this sophisticated adversary: crwdstr.ke/6010sUQwM

inf0secRabbit reposted

It’s wonderful to see what @XenoKovah and his collaborators have built for the community. I always recommend OST2 for my new hires and other juniors, or just anyone trying to get started on a new topic. The courses are excellent. It’s an honor to sponsor the Windows Security Path

aionescu's tweet image. It’s wonderful to see what @XenoKovah and his collaborators have built for the community. I always recommend OST2 for my new hires and other juniors, or just anyone trying to get started on a new topic. The courses are excellent. It’s an honor to sponsor the Windows Security Path

Thanks to Winsider Seminars & Solutions (@yarden_shafir & @aionescu) for Sponsoring #OST2 at the Gold🥇 level! Learn more about them here: windows-internals.com

OpenSecTraining's tweet image. Thanks to Winsider Seminars & Solutions (@yarden_shafir & @aionescu) for Sponsoring #OST2 at the Gold🥇 level!

Learn more about them here: windows-internals.com


inf0secRabbit reposted

Update: Our preliminary Post Incident Review (PIR) is available at the link below.  Details include the incident overview, remediation actions, and preliminary learnings. More to come in our full Root Cause Analysis (RCA). Automated recovery techniques, coupled with strategic…


inf0secRabbit reposted

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n

taviso's tweet image. This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n

inf0secRabbit reposted

CrowdStrike continues to focus on restoring all systems as soon as possible. Of the approximately 8.5 million Windows devices that were impacted, a significant number are back online and operational. Together with customers, we tested a new technique to accelerate impacted…


inf0secRabbit reposted

Essential reading in light of all the misinformation spreading around here about what went down. Be nice to your sysadmins and IT staff for a while. crowdstrike.com/blog/technical…


inf0secRabbit reposted

Without further ado - here is EtwInspector! This is a C++ tool to help users interact with ETW providers. This tool supports the enumeration of providers, their events, and capture events. github.com/jsecurity101/E…

When interacting with ETW I always feel like I have to use 2-3 tools to enumerate and capture desired events. What if there was an ETW tool that allowed you to enumerate providers, events that providers support, but also capture (multiple) providers. New ETW tool coming soon…

JonnyJohnson_'s tweet image. When interacting with ETW I always feel like I have to use 2-3 tools to enumerate and capture desired events.

What if there was an ETW tool that allowed you to enumerate providers, events that providers support, but also capture (multiple) providers. 

New ETW tool coming soon…
JonnyJohnson_'s tweet image. When interacting with ETW I always feel like I have to use 2-3 tools to enumerate and capture desired events.

What if there was an ETW tool that allowed you to enumerate providers, events that providers support, but also capture (multiple) providers. 

New ETW tool coming soon…
JonnyJohnson_'s tweet image. When interacting with ETW I always feel like I have to use 2-3 tools to enumerate and capture desired events.

What if there was an ETW tool that allowed you to enumerate providers, events that providers support, but also capture (multiple) providers. 

New ETW tool coming soon…
JonnyJohnson_'s tweet image. When interacting with ETW I always feel like I have to use 2-3 tools to enumerate and capture desired events.

What if there was an ETW tool that allowed you to enumerate providers, events that providers support, but also capture (multiple) providers. 

New ETW tool coming soon…


Loading...

Something went wrong.


Something went wrong.