tacodestroyer's profile picture. father. husband. photographer. taco lover. security dude. #SecKC #PancakeCoin

reverend wayne ³³º¹

@tacodestroyer

father. husband. photographer. taco lover. security dude. #SecKC #PancakeCoin

Be me. Go on vacation for 10 days. Come home to play @CallofDuty. Upgrade to latest version. Instant shadowban. Wtf?


reverend wayne ³³º¹ reposted

👀

HackingLZ's tweet image. 👀
HackingLZ's tweet image. 👀
HackingLZ's tweet image. 👀

reverend wayne ³³º¹ reposted

Oh man, an F-15 pilot friend gave me permission to share this video of him filming his buddy sending it. That maniacal laughter is universal among anyone who has seen this in person, even other fighter pilots. How can I NOT go to the base today to watch this. 🤘😀🤙


reverend wayne ³³º¹ reposted

CyberSec Trends Q4/24🔮 ⬆️EDR killers (vulnerable drivers) ⬆️Auxiliary execution files .lnk .msc .rdp ⬆️Abuse of legit remote access tools ⬆️Token/cloud API abuse ⬆️ADCS exploitation ⬆️Fake CAPTCHAs: copy&paste PowerShell ⬆️TA using systems out of EDR scope for persistence

cyb3rops's tweet image. CyberSec Trends Q4/24🔮

⬆️EDR killers (vulnerable drivers)
⬆️Auxiliary execution files .lnk .msc .rdp
⬆️Abuse of legit remote access tools
⬆️Token/cloud API abuse
⬆️ADCS exploitation
⬆️Fake CAPTCHAs: copy&paste PowerShell
⬆️TA using systems out of EDR scope for persistence
cyb3rops's tweet image. CyberSec Trends Q4/24🔮

⬆️EDR killers (vulnerable drivers)
⬆️Auxiliary execution files .lnk .msc .rdp
⬆️Abuse of legit remote access tools
⬆️Token/cloud API abuse
⬆️ADCS exploitation
⬆️Fake CAPTCHAs: copy&paste PowerShell
⬆️TA using systems out of EDR scope for persistence
cyb3rops's tweet image. CyberSec Trends Q4/24🔮

⬆️EDR killers (vulnerable drivers)
⬆️Auxiliary execution files .lnk .msc .rdp
⬆️Abuse of legit remote access tools
⬆️Token/cloud API abuse
⬆️ADCS exploitation
⬆️Fake CAPTCHAs: copy&paste PowerShell
⬆️TA using systems out of EDR scope for persistence
cyb3rops's tweet image. CyberSec Trends Q4/24🔮

⬆️EDR killers (vulnerable drivers)
⬆️Auxiliary execution files .lnk .msc .rdp
⬆️Abuse of legit remote access tools
⬆️Token/cloud API abuse
⬆️ADCS exploitation
⬆️Fake CAPTCHAs: copy&paste PowerShell
⬆️TA using systems out of EDR scope for persistence

reverend wayne ³³º¹ reposted

New ShellcodePack version coming out soon with: - Custom AMSI bypass to weaponize .NET assemblies - Obfuscated Python Shellcode launchers - File timestamp spoofing - Updated EDR bypass profiles #redteam

BallisKit's tweet image. New ShellcodePack version coming out soon with:
 - Custom AMSI bypass to weaponize .NET assemblies
 - Obfuscated Python Shellcode launchers
 - File timestamp spoofing
 - Updated EDR bypass profiles

#redteam

reverend wayne ³³º¹ reposted

Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems. On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.

nyxgeek's tweet image. Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems.

On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.
nyxgeek's tweet image. Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems.

On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.

reverend wayne ³³º¹ reposted

Please don’t touch that, It’s my emotional support Any Any Any Allow rule


reverend wayne ³³º¹ reposted

Our talk from @defcon is now available! In the presented research, we document every EDR bypass technique used in the wild along with how to detect it using new memory forensics techniques and @volatility plugins. Feedback appreciated! youtube.com/watch?v=PmqvBe… #DFIR

attrc's tweet card. DEF CON 32 - Defeating EDR Evading Malware with Memory Forensics -...

youtube.com

YouTube

DEF CON 32 - Defeating EDR Evading Malware with Memory Forensics -...


reverend wayne ³³º¹ reposted

I'm finally going to give the back story of the infamous zWarDial tool along with other security stories at @saintcon Tomorrow [Thursday @ 1:30 PM MDT] "The Bug Bounty Battlefield: A Choose Your Own Adventure Story on Why I Stopped Reporting Bugs" #saintcon 1/2

Hey folks--you might have seen a @BrianKrebs article on @zoom_us security that referenced #SecKC and @surbo this morning. You should know that we will NOT be releasing the #zWarDial to the public. If you see this tool offered, it is malware. krebsonsecurity.com/2020/04/war-di…

sec_kc's tweet image. Hey folks--you might have seen a @BrianKrebs article on @zoom_us security that referenced #SecKC and @surbo this morning. You should know that we will NOT be releasing the #zWarDial to the public. If you see this tool offered, it is malware. krebsonsecurity.com/2020/04/war-di…


reverend wayne ³³º¹ reposted

This is awesome. Our teams have fake tenants as honeypots that look like real ones—they contain realistic-looking data with realistic-looking users. But they’ve taken honeypots to a whole new level. They’re not just waiting for someone to fall into the trap. They actively search…


reverend wayne ³³º¹ reposted

Finding Windows Defender Exclusions via MpCmdRun.exe Links in next post!👇

miltinh0c's tweet image. Finding Windows Defender Exclusions via MpCmdRun.exe

Links in next post!👇

reverend wayne ³³º¹ reposted

A new version of my pentest template will be released later this fall. New tips, techniques, and resources are being added. Most importantly I am moving my notes away from Joplin to Obsidian. Here is a sneak peek of what the new template will look like:

TJ_Null's tweet image. A new version of my pentest template will be released later this fall. 

New tips, techniques, and resources are being added. Most importantly I am moving my notes away from Joplin to Obsidian. Here is a sneak peek of what the new template will look like:

reverend wayne ³³º¹ reposted

Over a year ago, I left my position at WithSecure to start a new journey, create something new, and do my own thing. Today, I'm excited to publicly announce what I've been working on all this time. Introducing 0xC2, a cross-platform C2 framework targeting Windows, Linux, and…

cube0x0's tweet image. Over a year ago, I left my position at WithSecure to start a new journey, create something new, and do my own thing. Today, I'm excited to publicly announce what I've been working on all this time.

Introducing 0xC2, a cross-platform C2 framework targeting Windows, Linux, and…

reverend wayne ³³º¹ reposted

Great intro to #reverse #engineering blog by @0x6D6172636F along with some amazing #ascii art! x86re.com

jstrosch's tweet image. Great intro to #reverse #engineering blog by @0x6D6172636F along with some amazing #ascii art!

x86re.com

reverend wayne ³³º¹ reposted

Meet MV Ocean Trader — a one-of-a-kind shadowy Special Operations mothership literally designed to hide in plain sight 👀 Operating AIS dark, under commercial guise & hoisting false flags, it can launch drones, helos, boats, & SEALS. Much is classified, but here’s what we know:

ianellisjones's tweet image. Meet MV Ocean Trader — a one-of-a-kind shadowy Special Operations mothership literally designed to hide in plain sight 👀

Operating AIS dark, under commercial guise & hoisting false flags, it can launch drones, helos, boats, & SEALS.

Much is classified, but here’s what we know:

reverend wayne ³³º¹ reposted

TIL: that intel i3,i5, i7 and i9 processors are all the same, all made the same, on the same wafer. But depending on how many defects (therefore how many sections actually work) they just rename them. So your i3 processor is an i9 with many defects less for an i5 and less for i7


reverend wayne ³³º¹ reposted

10: Whatever damages incur from your use of the product, they're on you. Even if CrowdStrike could have prevented it. Never use the product in sensitive environments, such as aircraft navigation systems (you can't make this stuff up), nuclear facilities, etc.

JusticeRage's tweet image. 10: Whatever damages incur from your use of the product, they're on you. Even if CrowdStrike could have prevented it.
Never use the product in sensitive environments, such as aircraft navigation systems (you can't make this stuff up), nuclear facilities, etc.

reverend wayne ³³º¹ reposted

My team at Red Siege has written, instructed and developed some awesome training over the last year with zero involvement from me. Unfortunately, even though they don't work for SANS and I have had zero input or part in their courses, SANS has told me that unless they stop…


reverend wayne ³³º¹ reposted

We often argue about which log source is the most important, how about which events? What are your top 5 and why? 4624 - need those logons 4688 - process creation of course 1006 - Defender AV detection 4104 - PowerShell script block logging 4697 - service installation events


reverend wayne ³³º¹ reposted

Loading...

Something went wrong.


Something went wrong.