MDSec (@mdseclabs) 's Twitter Profile
MDSec

@mdseclabs

Consultancy and Training from a trusted supplier of offensive security. Red Team and Adversary Simulation by ActiveBreach team | mdsec.co.uk | nighthawkc2.io

ID: 334002593

linkhttps://www.mdsec.co.uk calendar_today12-07-2011 12:36:48

1,1K Tweet

14,14K Followers

0 Following

Rich Warren (@buffaloverflow) 's Twitter Profile Photo

Wow, #RedTreat was a blast! Was amazing to see such high quality Red Team focused content & research being shared! 🔥 Enjoyed meeting everyone and putting faces to names/handles too! 👋 Great job and thanks to MDSec & Outflank for organising! 👏💯🏝️

Wow, #RedTreat was a blast!

Was amazing to see such high quality Red Team focused content & research being shared! 🔥

Enjoyed meeting everyone and putting faces to names/handles too! 👋

Great job and thanks to <a href="/MDSecLabs/">MDSec</a> &amp; <a href="/OutflankNL/">Outflank</a> for organising! 👏💯🏝️
XSS Payloads (@xsspayloads) 's Twitter Profile Photo

When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls, a good compilation of evasion techniques by MDSec mdsec.co.uk/2024/10/when-w…

Clint Gibler (@clintgibler) 's Twitter Profile Photo

😈 Common Detection & Evasion Techniques for Web Application Firewalls → Fuzzing, reversing regex rules, obfuscation/encoding, alternative character sets, request header spoofing + Real-world case studies of bypassing CloudFront, Cloudflare, F5 BIG-IP ASM, and Azure

MDSec (@mdseclabs) 's Twitter Profile Photo

Ready for some Thanks Giving reading? Nighthawk 0.3.3 Evanesco is now live for customers nighthawkc2.io/evanesco/ #happythanksgiving

Ready for some Thanks Giving reading? Nighthawk 0.3.3 Evanesco is now live for customers nighthawkc2.io/evanesco/ #happythanksgiving
MDSec (@mdseclabs) 's Twitter Profile Photo

Ever come across Altiris on a red team? We did.... Check out this post from Matt Johnson on how to extract ACC creds... Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris) mdsec.co.uk/2024/12/extrac…

Ever come across Altiris on a red team? We did.... Check out this post from <a href="/breakfix/">Matt Johnson</a> on how to extract ACC creds... Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris)
mdsec.co.uk/2024/12/extrac…
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I'm not doing training at BH USA this year, but some friends are and I highly recommend their courses: - Adv Detection Engineering by FalconForce Official - Building AI agents by Roberto Rodriguez 🇵🇪 - Adversary Simulation by MDSec And ofc the awesome courses by SpecterOps folks!

Dominic Chell 👻 (@domchell) 's Twitter Profile Photo

Last year's Black Hat was a blast so we're doing it all again! Join me and the @MDSeclabs crew in Vegas. Early bird discounts are now available. blackhat.com/us-25/training…

Last year's <a href="/BlackHatEvents/">Black Hat</a> was a blast so we're doing it all again! Join me and the @MDSeclabs crew in Vegas. Early bird discounts are now available. blackhat.com/us-25/training…
✞ inversecos (@inversecos) 's Twitter Profile Photo

NEW LAB: Mustang Panda 🐼🔍 Chinese cyber espionage APT targeting a government body across the U.S, Europe, and APAC Test your blue team skills on 👀 .NET malware 👀 DLL Sideloading 👀 Webshells 👀 Procdumps Lab Contributors Adversarial Emulation: MDSec ali 🕷️

NEW LAB: Mustang Panda 🐼🔍

Chinese cyber espionage APT targeting a government body across the U.S, Europe, and APAC

Test your blue team skills on
👀 .NET malware
👀 DLL Sideloading
👀 Webshells 
👀 Procdumps

Lab Contributors
Adversarial Emulation: <a href="/MDSecLabs/">MDSec</a>  <a href="/offensiveninja/">ali 🕷️</a>
✞ inversecos (@inversecos) 's Twitter Profile Photo

The Council of Tropical Affairs, while negotiating the mango export deal, have noticed suspicious activity on their network, specifically involving unauthorized access to shared documents. We have provided process dumps, disk images, SIEM access, and results from YARA outputs

The Council of Tropical Affairs, while negotiating the mango export deal, have noticed suspicious activity on their network, specifically involving unauthorized access to shared documents.

We have provided process dumps, disk images, SIEM access, and results from YARA outputs
XINTRA (@xintraorg) 's Twitter Profile Photo

Already three people have fully smashed the Mustang Panda lab with FULL points (zero hints used) over the weekend by MDSec and Zach Just sharing some more feedback we got on the lab 💪

Already three people have fully smashed the Mustang Panda lab with FULL points (zero hints used) over the weekend by <a href="/MDSecLabs/">MDSec</a> and <a href="/svch0st/">Zach</a> 

Just sharing some more feedback we got on the lab 💪
MDSec (@mdseclabs) 's Twitter Profile Photo

Stumbled on ServiceNow during a red team? If not you might want to check our latest post on Red Teaming with ServiceNow by Tim mdsec.co.uk/2025/03/red-te…

Stumbled on ServiceNow during a red team? If not you might want to check our latest post on Red Teaming with ServiceNow by <a href="/__invictus_/">Tim</a> mdsec.co.uk/2025/03/red-te…
0patch (@0patch) 's Twitter Profile Photo

We'd like to thank our sources researching various NTLM hash leak issues: 1) Dominic Chell 👻 of MDSec: mdsec.co.uk/2021/02/farmin… 2) Yorick Koster of Securify: securify.nl/en/blog/living… 3) Alex: swepstopia.com/url-file-attac…