I recently co-authored a @Unit42_Intel blog about a unique IR case in which a threat actor’s custom EDR bypass (using #BYOVD) exposed their toolkit, methods, and even identity. Check out how we unmasked them through an opsec slip-up! #dfirunit42.paloaltonetworks.com/edr-bypass-ext…
What a glorious day for Incident Responders around the world! Premium audit events in Microsoft 365 are now available to non-premium users.
🚨Action for you:
- Check your mailbox audit settings, details in the blog:
techcommunity.microsoft.com/t5/security-co…
How to disable some parts of EDR’s telemetry on Windows 10? Just ask nicely!
See riskinsight-wavestone.com/en/2023/10/a-u… for more info about an interesting logic bug we found on Win10 that affects all EDRs 😉
A promise is a promise: the slides from the #DEFCON30 DemoLabs @_Qazeer and I presented about EDRSandblast are uploaded on GitHub (github.com/wavestone-cdt/…), along with the latest version of the tool! Check out the list of new features in the slides, documentation is on its way ;)
Hey, do you like tokens? Have you always wanted to "harvest" tokens for offensive purposes? If so check out my new post posts.specterops.io/koh-the-token-… where I show I can (finally) write a technical post without memes, and then check out the Koh toolset at github.com/GhostPack/Koh
I'm extremely proud to announce @wavestone_ speaking engagements at @BSidesLV@defcon & more, and it doesn't fit in a tweet (far from it, actually), so a 🧵:
You enjoyed the awesome EDRSandblast tool of @th3m4ks and @_Qazeer and want to know more about the vulnerability used in the MSI AfterBurner driver to play in the kernel mode ?
Go check the vulnerability analysis done by hfiref0x
swapcontext.blogspot.com/2020/01/unwind…
🇫🇷🎙️ Nouvel épisode du podcast @hacknspeak avec @th3m4ks & @_Qazeer pour parler de leur outil EDRSandBlast 🚀
Une interview un peu plus technique que d'habitude où l'on parle du fonctionnement d'un EDR et des mécanismes de contournement 🔥
Bonne écoute 🎶anchor.fm/hacknspeak
7K Followers 77 FollowingProfessional redteamer and malware development enthusiast ! I will share some tips and experiences. Look at my work here : https://t.co/cxLBvW7pcI
12K Followers 488 FollowingSr. Penetration Tester / Red Team Operator @ptswarm :: Author of the Pentester’s Promiscuous Notebook :: He/him :: Tweets’re my pwn 🐣
1K Followers 398 FollowingI do security and stuff, sometimes cosplaying as a sysadmin. All opinions are shared by my employer and are hilarious.
https://t.co/SZOWltaTQI
19 Followers 1K FollowingSeek and destroy threats | I will find your malware and take down it | DM for Study together | I do not use Twitter so much | him, his | @Intelis_ABIN Agent/SEC
7K Followers 77 FollowingProfessional redteamer and malware development enthusiast ! I will share some tips and experiences. Look at my work here : https://t.co/cxLBvW7pcI
30K Followers 562 FollowingCyBeRsEcUrItY | Not afraid to put down with some THICC malware on disk | securing and breaking AI @PaloAltoNtwks | Ex @spacex
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
49K Followers 339 FollowingSecurity researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]
12K Followers 488 FollowingSr. Penetration Tester / Red Team Operator @ptswarm :: Author of the Pentester’s Promiscuous Notebook :: He/him :: Tweets’re my pwn 🐣
21K Followers 0 FollowingOur mission is to make the Internet more secure by bringing to light vulnerabilities, malicious activity and emerging threats. Join our Alliance!
11K Followers 316 FollowingAgentless Linux security. No endpoint agents and no drama. Linux malware, forensics, intrusion detection, and hacking. Founder @SandflySecurity.
9K Followers 3K FollowingThis Week in 4n6 // ThinkDFIR // SANS // CyberCX (DFIR)
https://t.co/vLyL2sxTuy
I might not know much, but I do know how to Google
Tweets are mine
22K Followers 600 FollowingDigital forensics and incident response. Ex-AFOSI, Mandiant, and CrowdStrike. SANS Institute Fellow and co-author of #FOR500 and #FOR508 courses.
6K Followers 2K FollowingStaff Security Researcher @datadoghq | DEF CON/Black Hat main stage speaker | he/him | OSCP OSWE | Tweets are my own | Created https://t.co/QGWMJjv9pc
1K Followers 2K FollowingGentil Hacker, RSSI, auteur du "Guide du survie au cybercrime en entreprise" et wanna-be vulgarisateur
Membre @cafe_sciences @CEFCYS_Officiel
815 Followers 263 FollowingSecurity enthusiast, old papy CTF player and eternal n00b for @Beers4Flags, #forensic & #DFIR addict. I like pcap, logs and dump memory analysis
6K Followers 2K FollowingBack to Red Teaming. Risk Hunter. DEFCON Staff & CFP Board. MS in DF. Fmr Fire/EMS. Red and Blue. Builder. Morally Flexible. https://t.co/zakkIXeyHu @ bluesky
13K Followers 310 FollowingThreat Researcher, Blue Team, DFIR, Malware Analysis, and Reverse Engineering.
“⚔️What do we say to God of malware, Not today⚔️”
21K Followers 1 FollowingRME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: https://t.co/UmkcXVG8MU
3K Followers 706 FollowingHusband, Father, #DFIR @ Unit 42, Digital Forensics Discord Admin, AboutDFIR Contributor, Author, #USMC Veteran, Former LE, NHL Fan, Dark Mode, Animals, Music
No recent Favorites. New Favorites will appear here.