lazzslayer (@lazzslayer) 's Twitter Profile
lazzslayer

@lazzslayer

Red Team | Co-Author of Redefining Hacking | VP for @bsidesnash | Advisory Board for @redteamvillage_ | OSCP, GCPN, CISM, GPEN | 🤠

ID: 1161404215857733632

linkhttps://infosec.exchange/@lazzslayer calendar_today13-08-2019 22:28:37

5,5K Tweet

4,4K Followers

580 Following

Blue Team Village (@blueteamvillage) 's Twitter Profile Photo

🚨One more day until #defcon33! Check out blueteamvillage.org/btv-at-def-con… for our village schedule, CTF and movie night events. We're also in the Hacker Tracker app. Visit us at LVCC West Hall Level 2. We're in rooms 213-218. #blueteam #cybersecurity We can't wait to see you! 💙

🚨One more day until #defcon33! Check out blueteamvillage.org/btv-at-def-con… for our village schedule, CTF and movie night events. We're also in the Hacker Tracker app. Visit us at LVCC West Hall Level 2. We're in rooms 213-218. #blueteam #cybersecurity We can't wait to see you! 💙
corgi (@corg_e) 's Twitter Profile Photo

Would you help a struggling pregnant woman? At Out Of The Box Security Conference in Bangkok I’ll talk about how I’ve hidden networking gear in a fake pregnancy belly, posed as cleaning staff in C-Suite offices, and (ultimately) escalate physical breaches to domain admin.

Would you help a struggling pregnant woman? At <a href="/OOTBconf/">Out Of The Box Security Conference</a> in Bangkok I’ll talk about how I’ve hidden networking gear in a fake pregnancy belly, posed as cleaning staff in C-Suite offices, and (ultimately) escalate physical breaches to domain admin.
SpecterOps (@specterops) 's Twitter Profile Photo

Lance Cain & Daniel Mayer shared examples of Jamf exploitation techniques available to threat actors in their #BHUSA briefing today, which included the introduction of two new tools: JamfHound & Eve.

Lance Cain &amp; Daniel Mayer shared examples of Jamf exploitation techniques available to threat actors in their #BHUSA briefing today, which included the introduction of two new tools: JamfHound &amp; Eve.
rekdt (@rekdt) 's Twitter Profile Photo

Deeply regret to inform everyone there may be news and video proof coming out about me Unfortunately it’s all true and deepest apologies to my friends who were unaware of repercussions due to their proximity to me I am and continue to be the greatest dubstep hypeman of all time

Sean Metcalf (@pyrotek3) 's Twitter Profile Photo

I am back to posting to ADSecurity.org in my free time (which I have again). I plan on adding new content relating to Active Directory & Azure AD (now Entra ID). First up is "Entra & Azure Managed Access Revisited". This article expands on one I wrote years ago about

I am back to posting to ADSecurity.org  in my free time (which I have again). I plan on adding new content relating to Active Directory &amp; Azure AD (now Entra ID).

First up is "Entra &amp; Azure Managed Access Revisited". This article expands on one I wrote years ago about
SpecterOps (@specterops) 's Twitter Profile Photo

The AD CS security landscape keeps evolving, and so does our tooling. 🛠️ Valdemar Carøe drops info on Certify 2.0, including a suite of new capabilities and refined usability improvements. ghst.ly/45IrBxI

Print3M // SecTube.tv (@print3m_) 's Twitter Profile Photo

"Turning Microsoft's Login Page into our Phishing Infrastructure". Super hot research from this year's DEF CON by Keanu Nys 🔥🚨 #phishing #redteam #defcon media.defcon.org/DEF%20CON%2033…

"Turning Microsoft's Login Page into our Phishing Infrastructure". Super hot research from this year's <a href="/defcon/">DEF CON</a> by <a href="/RedByte1337/">Keanu Nys</a> 🔥🚨

#phishing #redteam #defcon 

media.defcon.org/DEF%20CON%2033…
lazzslayer (@lazzslayer) 's Twitter Profile Photo

#hackersummercamp is a wrap! It was great seeing old friends and making new connections this year! 🤝 A huge shout out to the new RedTeamVillage leadership team for putting together an amazing experience this year! Already looking forward to DEF CON next year! 🌟

#hackersummercamp is a wrap! It was great seeing old friends and making new connections this year! 🤝

A huge shout out to the new <a href="/RedTeamVillage_/">RedTeamVillage</a> leadership team for putting together an amazing experience this year! 

Already looking forward to <a href="/defcon/">DEF CON</a> next year! 🌟
spencer (@techspence) 's Twitter Profile Photo

Hard truths about Active Directory... - It's going to be around for much much longer - Tiering isn't optional - The longer you avoid "cleaning up" the bigger your attack surface grows - Domain Controllers are not “just another server” - Running tasks and services as Domain Admin

安坂星海 Azaka || VTuber (@azakasekai_) 's Twitter Profile Photo

Just saw a sick live demo of wireless headphone hijacking that allows the attacker to perform the following without ever pairing the device. All the attacker has to do is be in range. - read/write arbitrary bytes to device - read headphones information - dump firmware info -

Just saw a sick live demo of wireless headphone hijacking that allows the attacker to perform the following without ever pairing the device. All the attacker has to do is be in range.
- read/write arbitrary bytes to device
- read headphones information
- dump firmware info 
-