Ofek itach (@ofekitach) 's Twitter Profile
Ofek itach

@ofekitach

ID: 891697951566954496

calendar_today30-07-2017 16:32:13

67 Tweet

108 Followers

460 Following

Samir (@sbousseaden) 's Twitter Profile Photo

processes that use bits in windows, SCCM client, browsers, outlook, onedrive & some update programs, powershell one was for testing thus it's not that frequent to have it there and if so likely the transfer job name will be known and can be baselined.

processes that use bits in windows, SCCM client, browsers, outlook, onedrive & some update programs, powershell one was for testing thus it's not that frequent to have it there and if so likely the transfer job name will be known and can be baselined.
Samir (@sbousseaden) 's Twitter Profile Photo

pivoting on rwdrv.sys (legit signed driver to discover UEFI other HW related settings) leads to Lojax/DoubleAgent UEFI rootkit. sysmon check eventid 6 with Signature: "ChongKim Chan" (cuz there are many version with diff hashes) - proper discovery for this type of TTP is a must

pivoting on rwdrv.sys (legit signed driver to discover UEFI other HW related settings) leads to Lojax/DoubleAgent UEFI rootkit. sysmon check eventid 6 with Signature: "ChongKim Chan" (cuz there are many version with diff hashes) - proper discovery for this type of TTP is a must
unknown (@unknownuser1806) 's Twitter Profile Photo

Useful for #redteam PENTESTING-BIBLE github.com/blaCCkHatHacEE… Nishang github.com/samratashok/ni… Awesome Red Teaming github.com/yeyintminthuht… LOLBins and LOLScripts github.com/LOLBAS-Project… Collection Document github.com/tom0li/collect… Venom github.com/Dliv3/Venom #bugbounty

unknown (@unknownuser1806) 's Twitter Profile Photo

#vulnScanners Vulns github.com/future-archite… lynis github.com/CISOfy/lynis Scanners-Box github.com/We5ter/Scanner… h4cker github.com/The-Art-of-Hac… trivy github.com/aquasecurity/t… xunfeng github.com/ysrc/xunfeng faraday github.com/infobyte/farad… #bugbountytips,#bugbounty

Samir (@sbousseaden) 's Twitter Profile Photo

sometimes you can see a detection opportunity from a short video :) [URL matches, access to ECP url & OTHERS normally is useful for Exchange Admin ppl only, from process exec flow u can monitor any susp child proc of w3wp.exe with parent_cmdline line "*-ap *MSExchangeECPAppPool*"

sometimes you can see a detection opportunity from a short video :) [URL matches, access to ECP url & OTHERS normally is useful for Exchange Admin ppl only, from process exec flow u can monitor any susp child proc of w3wp.exe with parent_cmdline line "*-ap *MSExchangeECPAppPool*"
Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Undocumented (what a surprise!) EVTX file format flag, making all internal checksums ignored. Good to have if you plan to manipulate the log content.🕵️ Simple "try this at home" #PowerShell script: github.com/gtworek/PSBits…

Undocumented (what a surprise!) EVTX file format flag, making all internal checksums ignored. 
Good to have if you plan to manipulate the log content.🕵️
Simple "try this at home" #PowerShell script: github.com/gtworek/PSBits…
Michael Maltsev (@m417z) 's Twitter Profile Photo

Have you ever needed to get an earlier version of the Windows binary you're analyzing? Did you end up downloading Windows ISOs or update packages just for that? Not anymore! Introducing Winbindex: m417z.com/winbindex/ m417z.com/Introducing-Wi…

Itay Cohen 🌱 (@megabeets_) 's Twitter Profile Photo

Excited to publish our research in which Eyal Itkin and I were able to fingerprint 2 of the most active exploit developers for Windows. Together, they account for 16 Windows LPE exploits, of which 5 were 0-Days that were sold to APTs and crime groups. research.checkpoint.com/2020/grapholog…

SkelSec (@skelsec) 's Twitter Profile Photo

I waited 2 years for this, rewrote impacket for this, asked cryptographers to remake algos in python for this, spent enormous time of my life to make this happen. and it's finally here this finally works and I can't find the words to express my satisfaction.

I waited 2 years for this, rewrote impacket for this, asked cryptographers to remake algos in python for this, spent enormous time of my life to make this happen. and it's finally here this finally works and I can't find the words to express my satisfaction.
Ilay Goldman (@goldmanilay) 's Twitter Profile Photo

Check out our new blog about repojacking. We show a massive dataset we used and introduce exploitation scenarios using real repoaitories examples

Aqua Security (@aquasecteam) 's Twitter Profile Photo

🚨 Aqua Nautilus researchers have identified the infrastructure of a potentially massive campaign against #cloud native environments. In the first of a two part series, we unfold the story of how we discovered the campaign, speculate on the threat actor, and share mitigation

Yakir Kadkoda (@yakirkad) 's Twitter Profile Photo

🚨 Thread: Six Critical AWS Vulnerabilities Found 🚨 We've uncovered serious vulnerabilities in AWS services, leading to potential remote code execution, data manipulation, and more. Here's what you need to know: 🧵[1/7]