Web Analytics
Thoughts on Security scriptjunkie
<
THE INFOSEC REVIVAL Why owning a typical network is so easy, and how to build ...
... just one of them to another respected hardware security group to inspect? Or at least share the photos and RE'd schematics?pic.twitter.com/4ck5ycQl9I
Generating Payloads
No; 21.
... Defensive Security Podcast; 62.
x0rz on Twitter: "Deadly supply chain attacks: compromise system beforehand, very difficult to detect (if not impossible), talk by @scriptjunkie1 ...
redteamingtheccdc-140510181648-phpapp01-thumbnail-4.jpg?cb=1399745910
Obligatory Debian random reference
6:58 AM - 21 Jul 2017
OS X password interception demo (no audio)
NCSC UK on Twitter: "How are most passwords cracked? https://t.co/8HY6c8HoAW #PasswordDay… "
57.
16.
... software utilities Malware; 71.
VANGUARD SECURITY & COMPLIANCE 2016 Philip Young ZedSec 390 CST08 Advanced Mainframe Hacking SECURITY & COMPLIANCE ...
The enterprise sandbox malware analyzing appliance of your victim is licensed to analyze 1,5k samples per day? Send him 1500 different bullshit files and ...
3 replies 66 retweets 112 likes
Bypassing Crowdstrike Falcon detection, from phishing email to reverse shell ...
scriptjunkie
Duo Security on Twitter: "Cheers to Whitney Merrill @wbm312, lawyer with @FTC, on winning the 2017 Women in Security Award, Industry edition! ...
Welcome ...
Credential Assessment Mapping Privilege Escalation at Scale Matt Weeks @scriptjunkie1 ...
DEF CON 19 - Matt "scriptjunkie" Weeks - Network Nightmare: Ruling The Nightlife - YouTube
Joe Security on Twitter: "Another day another nifty tricky to deliver malware via #Office. This time via PPS URL Mouse Hover #malware #dfir ...
scriptjunkie on Twitter: "No protected mode, no AMSI, no AV's understand the format and don't detect, shellcode execution. Ancient Excel 4 macros in slk ...
1 reply 17 retweets 32 likes
4 replies 89 retweets 212 likes
x0rz on Twitter: "Deadly supply chain attacks: compromise system beforehand, very difficult to detect (if not impossible), talk by @scriptjunkie1 ...
scriptjunkie @scriptjunkie1
SANS' 2009 illustration of Compromising a Domain Controller
Joe Security on Twitter: "Another day another nifty tricky to deliver malware via #Office. This time via PPS URL Mouse Hover #malware #dfir ...
14 References ...
Thumb Drives, HID-spoofing Devices ...
7:00 AM - 29 May 2017
২:৫৩ PM - ৩ ডিসেম্বর, ২০১৭
Blue Team CTF is a challenge meant to teach information security professionals practical incident response skills in an environment that very closely ...
A recording of Monday's webinar by root9B is available to.
... 48.
I love the architecture of our State Capitol Building and use it as my phone bg. It's ten feet taller than DC Capitol Building on purpose.pic.twitter.com/ ...
avatar of mikedesmondhotmail-com
Nmap WITH Service Probes; 18. VANGUARD SECURITY ...
Matthew Weeks liked this
root9B
Dan Guido on Twitter: "Don't confuse my distaste for the disclosure with advocacy for S/MIME, PGP, or encrypted email. You should: 1) use authenticated ...
What are the problems?
36. VANGUARD SECURITY ...
Effie Trinket from the Hunger Games
8 replies 2 retweets 15 likes
49 replies 243 retweets 2,199 likes
Microsoft now recommends that the KRBTGT password change on a regular basis.
May 8th, 2017
... 42.
YouTube Premium
Joe Security on Twitter: "Another day another nifty tricky to deliver malware via #Office. This time via PPS URL Mouse Hover #malware #dfir ...
RADON is not the same RADON used by the National Security Agency (NSA) as was speculated by the InfoSec institute. RADON does appear similar in some ...
Alex Ionescu on Twitter: "1/ Of all the weird stuff I have ever seen Win32k.sys do, and trust me, I've seen a lot, I have to say this takes the icing on ...
Security ...
... 31.
The Trouble with Certificate Transparency
About Me Some quick info.
... 32.
1 reply 0 retweets 3 likes
1 reply 1 retweet 4 likes
2:16 PM - 8 Sep 2017
haroon meer on Twitter: "In 2016, The CIA released "Scribbles" to "embed "Web beacon"-style tags into documents" - For everyone else, ...
46 replies 80 retweets 345 likes
1 reply 1 retweet 2 likes
0 replies 0 retweets 1 like
Tin Foil Hats Actually Make it Easier for the Government to Track Your Thoughts - Atlantic Mobile
R9B FEATURED IN HILL TIMES INSIDERS GUIDE
0 replies 0 retweets 0 likes
How hard do you hack back?
1 reply 0 retweets 1 like
0 replies 0 retweets 6 likes
Scanners Collectors Database Analysis UI ...
CVE-2010-3765 : Mozilla Firefox Interleaving document.write and appendChild Exploit
Password not pwned
Uh oh!
2 replies 2 retweets 8 likes
J. A. Guerrero-Saade
Script Junkie | How to Debug Your jQuery Code
The Devil
root9B Moves to #1 on the Cybersecurity 500 List for 2016
0 replies 4 retweets 6 likes
How to build your own Alexa skills with the new Alexa.
Both are important parts of a security program; 4.
root9B Announces Release of ORKOS - Credential Risk Assessment and Remediation Solution
4 replies 1 retweet 15 likes
Matthew Weeks