Den Iuzvyk(@duzvik) 's Twitter Profileg
Den Iuzvyk

@duzvik

security

ID:158298949

calendar_today22-06-2010 08:58:46

810 Tweets

513 Followers

710 Following

Andrii Bezverkhyi(@andriinb) 's Twitter Profile Photo

Starting today, if you know one of the SIEM, EDR or Data Lake languages, you know them all!
Dear industry, please meet RootA roota.io

RootA is a public-domain language for collective cyber defense, created to make threat detection, incident response, and actor…

Starting today, if you know one of the SIEM, EDR or Data Lake languages, you know them all! Dear industry, please meet RootA roota.io RootA is a public-domain language for collective cyber defense, created to make threat detection, incident response, and actor…
account_circle
Andrii Bezverkhyi(@andriinb) 's Twitter Profile Photo

Florian Roth Ross Haleliuk Florian Roth your comment is very far from the truth my friend. I’ll drop some facts tomorrow. Maybe in some parallel reality you can state things like that, but in this timeline, on this planet, I publicly ask you to not spread misinformation about me and my team’s contribution to…

account_circle
✞ inversecos🩸(@inversecos) 's Twitter Profile Photo

1\ for APT abuse of Exchange

APT Exchange abuse has been a common theme with techniques ranging from:
> Compiled DLL OWA backdoors
> .req webshells
> EWS / Legacy auth abuse
> Log / File deletion

TL;DR below or check out the full blog 👇👇
inversecos.com/2022/07/huntin…

1\ #ThreatHunting for APT abuse of Exchange APT Exchange abuse has been a common theme with techniques ranging from: > Compiled DLL OWA backdoors > .req webshells > EWS / Legacy auth abuse > Log / File deletion TL;DR below or check out the full blog 👇👇 inversecos.com/2022/07/huntin…
account_circle
tlansec(@tlansec) 's Twitter Profile Photo

✅ Exploitation of 0⃣ day at the time?
✅ Web🐚s involved?
✅ DNS MiTM? 👨‍🏭

It can only mean one thing.

Volexity blog:

volexity.com/blog/2022/06/1…

account_circle
Tzah Pahima(@TzahPahima) 's Twitter Profile Photo

I was able to access thousands of companies’ passwords on and run code on their VMs.
This includes access to Microsoft’s own credentials… 💣

Here’s HOW I did it.
This is the story of . (1/11)

account_circle
Andrii Bezverkhyi(@andriinb) 's Twitter Profile Photo

Адаптований переклад бест практик по кіберзахисту в умовах війни з SANS Shields UP: Six Defensive Techniques to Make Your Attackers Cry: Russia and Ukraine Cyber Crisis. Прошу поширити всім хто долучений до ІТ в Україні.
linkedin.com/pulse/shields-…

HackerHub CERT-UA UnderDefense LLC

Адаптований переклад бест практик по кіберзахисту в умовах війни з SANS Shields UP: Six Defensive Techniques to Make Your Attackers Cry: Russia and Ukraine Cyber Crisis. Прошу поширити всім хто долучений до ІТ в Україні. linkedin.com/pulse/shields-… @dsszzi @_CERT_UA @underdefense
account_circle
Ring3API 🇺🇦 We Are Fighting For Our Land(@ntlmrelay) 's Twitter Profile Photo

📌My Quick and Dirty script for defenders to prepare ANY.RUN sandbox (cmdline/powerhell logging, audit, ) and grab that logs after execution for additional analysis and rules creation.

➡️gist.github.com/devnullz/55bad…

account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

Senior Security Consultant Jean gives us the first comprehensive resource about all things . This guide covers a range of techniques from most common to the lesser-known.

hubs.la/Q013rK9g0

account_circle
Félix Aimé(@felixaime) 's Twitter Profile Photo

⚠️Following the dnspy[.]net case, here is a list of domains owned by the same threat actor. The campaign spreading backdoored installers is STILL ONGOING, and targeting several open source projects: ↘️ (h/t Sekoia.io) [1/6]

⚠️Following the dnspy[.]net case, here is a list of domains owned by the same threat actor. The campaign spreading backdoored installers is STILL ONGOING, and targeting several open source projects: ↘️ (h/t @sekoia_io) [1/6]
account_circle
Andy Robbins(@_wald0) 's Twitter Profile Photo

I’m a firm believer in the (cliche) adage, “Outcomes, not output.” It’s not about the number of lines of code you wrote in 2021, but the impact those lines of code had - the outcomes they created. Here’s 5 small things you can do in 2022 to create big AD security outcomes:

account_circle
Lars Karlslund - mucking around with your AD(@lkarlslund) 's Twitter Profile Photo

Your Azure AD Connect server ... it's a Tier 0 asset. Why? Because the Azure AD account it contains can probably compromise your entire tenant. If you use inbound password sync, the AD account it uses can potentially cost you your AD too. 1/7

Your Azure AD Connect server ... it's a Tier 0 asset. Why? Because the Azure AD account it contains can probably compromise your entire tenant. If you use inbound password sync, the AD account it uses can potentially cost you your AD too. 1/7
account_circle
Jared Atkinson(@jaredcatkinson) 's Twitter Profile Photo

🧵
A user in the Bloodhound Slack asked a question about how they could start approaching the task of detecting BH (Sharphound) and it inspired me to write my thoughts on the matter. Since it is buried as a random thread in Slack, I figured I'd share it here as a thread.

account_circle
Frank Boldewin(@r3c0nst) 's Twitter Profile Photo

Blueteamers should read about Windows Syscalls and how they can bypass security solutions as Redteamers and authors make use of them to stay under the radar. Nice writeup by @m0rv4i

Blueteamers should read about Windows Syscalls and how they can bypass security solutions as Redteamers and #malware authors make use of them to stay under the radar. Nice writeup by @m0rv4i #DFIR
account_circle
mpgn(@mpgn_x64) 's Twitter Profile Photo

Lately, two new tools for dumping the lsass process have come up: HandleKatz and nanodump 👀

I've integrated them to CrackMapExec as module:
1⃣ -M handlekatz
2⃣ -M nanodump
3⃣ -M procdump (as bonus 😝)
(dmp parsed by pypykatz from SkelSec )

Available on Porchetta Industries 🪂

Lately, two new tools for dumping the lsass process have come up: HandleKatz and nanodump 👀 I've integrated them to CrackMapExec as module: 1⃣ -M handlekatz 2⃣ -M nanodump 3⃣ -M procdump (as bonus 😝) (dmp parsed by pypykatz from @SkelSec ) Available on @porchetta_ind 🪂
account_circle
Red Canary(@redcanary) 's Twitter Profile Photo

New from Jonny Johnson: MSRPC to ATT&CK is an encyclopedia of comprehensive context about specific Remote Procedure Call protocols. redcanary.com/blog/msrpc-to-…

New from @jsecurity101: MSRPC to ATT&CK is an encyclopedia of comprehensive context about specific Remote Procedure Call protocols. redcanary.com/blog/msrpc-to-…
account_circle