Will Schroeder
@harmj0y
Researcher @SpecterOps. Coding towards chaotic good while living on the decision boundary.
ID:780926406
http://blog.harmj0y.net/ 25-08-2012 19:26:22
6,1K Tweets
45,8K Followers
938 Following
Join Sean Metcalf at #BSidesCharm 2024 as he presents 'The Problem with Identity Security & How to Fix It' where explores the issues with Identity security - specifically AD & Azure AD - leading to full compromise, recent breaches (MGM), & mitigations.
bsidescharm.org/registration/
While Microsoft's User Account Control is not defined as a security boundary, bypassing UAC is still something attackers frequently do. Check out this blog post from Matt Nelson detailing one method for bypassing UAC using App Paths. ghst.ly/43U8XQY
👋 Hello, Nashville! If you’re at #WiCyS2024 come by Booth 228 to chat with a few Specters and learn more about us.
Octoberfest7 This was always the end state for OST. Once defense/CTI was able to feed things into EDR/detections faster, people who do this daily would pull back on publishing. It's more likely you'll see generic research or basic PoCs.
Obviously, up and coming people trying to make a name…