Shina Mashiro (@shiinaam) 's Twitter Profile
Shina Mashiro

@shiinaam

Microsoft Sentinel | 4n6 Investigator | Cloud Security | ๐Ÿ‡ฎ๐Ÿ‡ฉ S.Kom

ID: 589016089

calendar_today24-05-2012 10:24:39

1,1K Tweet

334 Followers

2,2K Following

Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''Leveraging Windows Event Logs for Effective Threat Hunting'' #infosec #pentest #redteam #blueteam b1ackmamba.medium.com/leveraging-winโ€ฆ

tooManyOpenThreats (@ownerprocessid_) 's Twitter Profile Photo

domainhunter.pro DomainHunter is a domain intelligence platform that helps security professionals monitor and analyze recently registered domains. โซ13.305.183 Domains Mapped ๐Ÿ“ท30.462 Searches Performed

domainhunter.pro DomainHunter is a domain intelligence platform that helps security professionals monitor and analyze recently registered domains.  

โซ13.305.183 Domains Mapped
๐Ÿ“ท30.462        Searches Performed
Philip Elder (@mpecsinc) 's Twitter Profile Photo

ACTIVE DIRECTORY SECURITY: WINDOWS FIREWALL ENABLED BY DEFAULT RIGHT? AND LOGGING RIGHT? There is absolutely no excuse for turning off the built-in Windows Firewall. None. It is integrated into the network stack. It goes into a form of Limp Mode and that means being blind to

ACTIVE DIRECTORY SECURITY: WINDOWS FIREWALL ENABLED BY DEFAULT RIGHT? AND LOGGING RIGHT?

There is absolutely no excuse for turning off the built-in Windows Firewall. None.

It is integrated into the network stack. It goes into a form of Limp Mode and that means being blind to
Orin Thomas (@orinthomas) 's Twitter Profile Photo

How to investigate Phishing Incidents in Microsoft Defender for Office 365 techcommunity.microsoft.com/blog/coreinfraโ€ฆ

How to investigate Phishing Incidents in Microsoft Defender for Office 365 techcommunity.microsoft.com/blog/coreinfraโ€ฆ
Rey (@reyxbf) 's Twitter Profile Photo

Yesterday, a threat actor exploited a domain takeover vulnerability related to a CDN used by CoinMarketCap (also known as CMC) to load a malicious tool known as a Drainer a script designed to steal crypto from usersโ€™ wallets But who is behind this attack?...

Yesterday, a threat actor exploited a domain takeover vulnerability related to a CDN used by CoinMarketCap (also known as CMC) to load a malicious tool known as a Drainer a script designed to steal crypto from usersโ€™ wallets

But who is behind this attack?...
DirectoryRanger (@directoryranger) 's Twitter Profile Photo

SentinelOne Must-Have Custom Detection Rules #DFIR Part 1 medium.com/@cyberengage.oโ€ฆ Part 2 medium.com/@cyberengage.oโ€ฆ Part 3 medium.com/@cyberengage.oโ€ฆ

Sam Erde (@samerde) 's Twitter Profile Photo

Have you heard about the Microsoft Artifact Repository yet? MAR has official container images, application frameworks, and #PowerShell modules. It helps ensure a more secure supply chain than the public PowerShell Gallery can provide. ๐Ÿ“ฆ๐Ÿ” Read more at day3bits.com/2025-06-20-usiโ€ฆ

Het Mehta (@hetmehtaa) 's Twitter Profile Photo

๐ŸšจFREE RED TEAMING COURSES For cyber folks, redteamleaders is sharing some awesome red team courses and you can enroll for free to learn with hands-on labs: - AV/EDR Evasion Practical Techniques Enroll: lnkd.in/di4MgTMw - Offensive Development Introduction for Windows

๐ŸšจFREE RED TEAMING COURSES 

For cyber folks, redteamleaders is sharing some awesome red team courses and you can enroll for free to learn with hands-on labs:

- AV/EDR Evasion Practical Techniques
Enroll: lnkd.in/di4MgTMw

- Offensive Development Introduction for Windows
spencer (@techspence) 's Twitter Profile Photo

How to find insecure delegations in active directory 1. Download and run ADeleg 2. Click View -> Index view by -> Trustees 3. Look for: Everyone, Authenticated Users, Domain Users Check the permissions on the right side to see if there's any privileged resources listed, such as

How to find insecure delegations in active directory

1. Download and run ADeleg
2. Click View -> Index view by -> Trustees
3. Look for: Everyone, Authenticated Users, Domain Users

Check the permissions on the right side to see if there's any privileged resources listed, such as
X (@themsterdoctor1) 's Twitter Profile Photo

๐Ÿšจ 1 COMMAND TO OWN AN ENTIRE NETWORK ๐Ÿง  Advanced Nmap Recon + Grep Filtering + Banner Fingerprinting nmap -n -Pn -sS -sV -p80 --open --script=banner -T5 192.168.1.0/24 -oG - | grep 'open' | grep -v 'tcpwrapped' โœ… Fast โœ… Silent โœ… Filters noise โœ… IDs Apache, IIS, embedded

๐Ÿšจ 1 COMMAND TO OWN AN ENTIRE NETWORK

๐Ÿง  Advanced Nmap Recon + Grep Filtering + Banner Fingerprinting

nmap -n -Pn -sS -sV -p80 --open --script=banner -T5 192.168.1.0/24 -oG - | grep 'open' | grep -v 'tcpwrapped'

โœ… Fast
โœ… Silent
โœ… Filters noise
โœ… IDs Apache, IIS, embedded
Wietze (@wietze) 's Twitter Profile Photo

#HuntingTipOfTheDay: there are numerous open-source projects listing cyber threats. Some of these have easily ingestible indicators... how about: ๐Ÿ”ต lots-project.com + LOLBINs ๐ŸŸ  hijacklibs.net + DLL write events ๐ŸŸข lolrmm.io + DNS requests

#HuntingTipOfTheDay: there are numerous open-source projects listing cyber threats. Some of these have easily ingestible indicators... how about:
๐Ÿ”ต lots-project.com + LOLBINs
๐ŸŸ  hijacklibs.net + DLL write events
๐ŸŸข lolrmm.io + DNS requests
Smukx.E (@5mukx) 's Twitter Profile Photo

CrowdStrike Researchers Investigate the Threat of Patchless AMSI Bypass Attacks crowdstrike.com/en-us/blog/croโ€ฆ

CrowdStrike Researchers Investigate the Threat of Patchless AMSI Bypass Attacks

crowdstrike.com/en-us/blog/croโ€ฆ