Steve (SteveSec) (@_stevesec) 's Twitter Profile
Steve (SteveSec)

@_stevesec

Senior Penetration Tester || Security Researcher || s-sec.live/blog

ID: 1345735707424382979

linkhttps://stevesec.com/ calendar_today03-01-2021 14:16:56

176 Tweet

46 Followers

253 Following

Steve (SteveSec) (@_stevesec) 's Twitter Profile Photo

I successfully completed PacketDetective Blue Team Lab at CyberDefenders®™! cyberdefenders.org/blueteam-ctf-c… #CyberSecurity #BlueYard #BlueTeam #InfoSec #SOC #SOCAnalyst #DFIR

Steve (SteveSec) (@_stevesec) 's Twitter Profile Photo

🚨 Packet Analysis: A Must-Have Skill 🚨 🔍 Defenders: Detect threats, analyze anomalies & stop attacks. 💀 Attackers: Map networks, exploit weaknesses & stay stealthy. 🔗 Learn more: buff.ly/4aMzEuc #CyberSecurity #Infosec #Network #Security CyberDefenders®™

Steve (SteveSec) (@_stevesec) 's Twitter Profile Photo

🚨 Malware in PDFs? Analyze it like a pro! 🚨 Attackers hide payloads in PDFs—don’t get fooled. This walkthrough goes through the analysis of a malicious PDF. 🔍 Check it out: buff.ly/4hn8IUA #CyberSecurity #MalwareAnalysis #PDFThreats #Infosec

Joe (GonzoSec) 🇺🇸🇺🇦 (@jsark983) 's Twitter Profile Photo

Psyched my talk, “Garbage In, Garbage Out: How to ACTUALLY Use AI for Security Work” was accepted for HackSpaceCon! Can’t wait to attend for the first time. Thanks RedSeerSecurity for choosing me! Who else will I see there? #infosec #cybersecurity #hacking #redteam #blueteam

Jason Haddix (@jhaddix) 's Twitter Profile Photo

⚠️ Giveaway time! ⚠️ 👇 📢 Our new course "Attacking AI" will be Feb 27-28! This two-day course equips security professionals with the tools and methodologies to identify vulnerabilities in AI systems. It's gonna be a BANGER. Syllabus: payhip.com/b/2qPZ1 We are giving

Steve (SteveSec) (@_stevesec) 's Twitter Profile Photo

#RedTeamers, have you played around with VS Code Tunnel? Just started playing around with it and it seems like a pretty seamless way to get remote code execution on a target system. Asking for a friend... #vscode #hacking #pentesting #microsoft #network #infosec

Steve (SteveSec) (@_stevesec) 's Twitter Profile Photo

🔍 HTB Unrested Write-Up 🔍 Took on Unrested, a Linux box with tricky enumeration, custom exploits & privilege escalation. A solid test of fundamentals & creative thinking! Read here: buff.ly/415PKMD #HackTheBox #CyberSecurity #RedTeam #CTF #Linux

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Brave now lets you inject custom JavaScript to tweak websites - Bill Toulas bleepingcomputer.com/news/software/… bleepingcomputer.com/news/software/…

¯\_(ツ)_/¯ (@chocapikk_) 's Twitter Profile Photo

900+ WordPress plugins just casually leak their presence. No bruteforce, no guessing, just a simple request. Wild. Haven't seen anyone using this for recon yet. 🤔 Soon. cc: LeakIX

900+ WordPress plugins just casually leak their presence.
No bruteforce, no guessing, just a simple request. Wild.
Haven't seen anyone using this for recon yet. 🤔
Soon.

cc: <a href="/leak_ix/">LeakIX</a>
Danny Deraney (@dannyderaney) 's Twitter Profile Photo

For those who don't know, that was Declan LeBaron with Bradley Cooper. Declan has spent most of his life in the hospital with systemic juvenile arthritis. Bradley surprised him with tix to the Super Bowl. In a world of narcissists, be more like Bradley. #SuperBowlLIX

For those who don't know, that was Declan LeBaron with Bradley Cooper. Declan has spent most of his life in the hospital with systemic juvenile arthritis. Bradley surprised him with tix to the Super Bowl.

In a world of narcissists, be more like Bradley. #SuperBowlLIX
Steve (SteveSec) (@_stevesec) 's Twitter Profile Photo

I performed my first malware analysis against a malicious Android application and let me tell you, it was a doozy. From deobfuscating a Stage 1 payload using AES encryption to substituting large amounts of unreadable text using CFR, follow me on this journey:

Steve (SteveSec) (@_stevesec) 's Twitter Profile Photo

🚨 I Did the Thing! 🚨 My FIRST YouTube video on Phishing Analysis is live! A little rough, but packed with solid insights. 🔗 Watch: buff.ly/41becL7 💬 Like, comment & sub! #CyberSecurity #Phishing #Infosec #BlueTeam #Defense

Steve (SteveSec) (@_stevesec) 's Twitter Profile Photo

Security researchers have uncovered a growing threat in the wild—Xworm malware. This malicious software is notorious for its ability to spread through networks, often targeting vulnerable devices and gaining unauthorized access. 🛡️ 💥 Key Features of Xworm: - Propagation via