techspence's profile picture. 🛠️ Sysadmin roots. Hacker mindset. Defender mission. | Helping IT teams make their environments harder to attack | @SecurIT360 | @cyberthreatpov

spencer

@techspence

🛠️ Sysadmin roots. Hacker mindset. Defender mission. | Helping IT teams make their environments harder to attack | @SecurIT360 | @cyberthreatpov

Pinned

Starting with a DENY ALL approach for application control is a great way to get the project canned... I recommend IT teams start by blocking known badness: - RMM products - Common LotL binaries - Vulnerable drivers These have much higher signals of a "threat" than the wrong…

techspence's tweet image. Starting with a DENY ALL approach for application control is a great way to get the project canned...

I recommend IT teams start by blocking known badness:

- RMM products
- Common LotL binaries
- Vulnerable drivers

These have much higher signals of a "threat" than the wrong…

PAM is great, but just like pentesters need to know their tools, defenders need to understand their security controls

Someone once told me: we use a PAM solution - the admin's password is changed every time they elevate. Me: I became that admin when they logged in to a server I controlled after compromising the primary site server for SCCM. The admin was DBO for all the databases in the…



They immediately laughed and told me that’s not a good password. Lesson, learned 💪😆 x.com/techspence/sta…

I created an account on my gaming pc for my kids, but didn’t tell them the password. They guessed it in 12 minutes. Honestly… I don’t know if I should be worried or proud.



I created an account on my gaming pc for my kids, but didn’t tell them the password. They guessed it in 12 minutes. Honestly… I don’t know if I should be worried or proud.


Be the change you want to see in the world 💪

Some of y’all are way too young to be this jaded in your cybersecurity takes. Whatever problems you think exist in this space, go solve them. You need to still believe that’s possible. You can be angry later.



Testing and validating assumptions is an under appreciated skill. Can’t tell you how many times I’ve found misconfigs in AD as a result of saying: “There’s no way this will work..”


🤦‍♂️Two Active Directory misconfigs I wish I’d never see again… - Domain Admins used as service accounts with weak passwords - bobjones_adm with the same password as svc_bjones


Auditing & logging in Active Directory is foundational and the starting point for a good threat detection (TD) program. When working with clients on TD assessments one of the most common recommendations we have is, you need to turn on more logs…


When we launched PentestList v1 last year, I just wanted a simple place to find the best and newest infosec resources. Today, I’m releasing PentestList v2 🚀 After a year of feedback and some user growth, we’ve redesigned the experience and added a bunch of new features: ✅…

TurvSec's tweet image. When we launched PentestList v1 last year, I just wanted a simple place to find the best and newest infosec resources.

Today, I’m releasing PentestList v2 🚀

After a year of feedback and some user growth, we’ve redesigned the experience and added a bunch of new features:

✅…
TurvSec's tweet image. When we launched PentestList v1 last year, I just wanted a simple place to find the best and newest infosec resources.

Today, I’m releasing PentestList v2 🚀

After a year of feedback and some user growth, we’ve redesigned the experience and added a bunch of new features:

✅…
TurvSec's tweet image. When we launched PentestList v1 last year, I just wanted a simple place to find the best and newest infosec resources.

Today, I’m releasing PentestList v2 🚀

After a year of feedback and some user growth, we’ve redesigned the experience and added a bunch of new features:

✅…


More sysadmins need to know this… Domain admins aren’t the end goal, they are the stepping stone to a larger, more expensive outcome


spencer reposted

This is the ideal operating system UI. You may not like it, but this is what peak performance looks like.

nyxgeek's tweet image. This is the ideal operating system UI. You may not like it, but this is what peak performance looks like.

spencer reposted

So, let me say this about Active Directory: Large and mid-sized orgs who have had well-run security programs in place for quite a while and typical levels of resources for large and mid-sized orgs available to devote IT & security should today have quite solid setups in place.

Hard truths about Active Directory… - it’s older than most of the pentesters testing it - attackers know how to attack it as much as sysadmins know how to protect it - misconfigurations age like milk, not wine - once the domain is compromised, you’re basically looking at a…



Why is everything so broken and unstable? The eternal struggle of sysadmins everywhere…


Most pentest buyers focus on price… As with all things in life, the cheapest is usually NOT the best. Here’s 3 questions I recommend folks ask when shopping around: 1. Can I see a real sample report? 2. Can I speak with the actual pentester before signing? 3. Can the…


Loading...

Something went wrong.


Something went wrong.