Tom Jøran Sønstebyseter Rønning (@l1v1ng0ffth3l4n) 's Twitter Profile
Tom Jøran Sønstebyseter Rønning

@l1v1ng0ffth3l4n

#RiskHunter and #CyberSecurity Researcher from Norway, specializing in #PenetrationTesting using only tools that are already on the system.

ID: 1496198618411323397

calendar_today22-02-2022 19:03:06

151 Tweet

64 Takipçi

210 Takip Edilen

Tom Jøran Sønstebyseter Rønning (@l1v1ng0ffth3l4n) 's Twitter Profile Photo

Watching Yossi Sassi at HackCon Norway doing his very interesting talk "That’s Just a Tool – Not Good Nor Bad. That Part is Up to YOU" about exploiting living off the land tools.

Watching <a href="/Yossi_Sassi/">Yossi Sassi</a> at <a href="/hackcon/">HackCon Norway</a> doing his very interesting talk "That’s Just a Tool – Not Good Nor Bad. That Part is Up to YOU" about exploiting living off the land tools.
Tom Jøran Sønstebyseter Rønning (@l1v1ng0ffth3l4n) 's Twitter Profile Photo

Participated in this years #DNB #CTF - had a lot of fun, and learned a lot - well organized and fun challenges. Looking forward to next year already! dnbtech.no/2024/dnb-captu…

Logan Goins (@_logangoins) 's Twitter Profile Photo

I wrote a fun write-up on ADCS exploitation, including explanations and custom built examples of practical exploitation for all 13 ESC vulnerabilities. It's available on my blog: logan-goins.com/2024-05-04-ADC… Hope this helps anyone who's interested in #activedirectory security :)

I am Jakoby (@i_am_jakoby) 's Twitter Profile Photo

I made a powershell module to work with the LOLBAS project website to automate LOLBIN hunting and execution on your system this is a really cool way to learn what the current active lolbins are and how to use them

Andy Robbins (@_wald0) 's Twitter Profile Photo

From initial access to Domain Admin... with a detour through Entra. Another real example from a real environment. We will demonstrate the discovery, execution, and remediation of this specific attack path in this webinar on August 22: specterops.zoom.us/webinar/regist…

From initial access to Domain Admin... with a detour through Entra. Another real example from a real environment.

We will demonstrate the discovery, execution, and remediation of this specific attack path in this webinar on August 22: specterops.zoom.us/webinar/regist…
silentwarble (@silentwarble) 's Twitter Profile Photo

RedTeamTacticsAcademy I've found it useful for establishing a common language. That said I've run in to this scenario a few times. Couldn't find the original so I remade this.

<a href="/RedTeamTactics/">RedTeamTacticsAcademy</a> I've found it useful for establishing a common language. That said I've run in to this scenario a few times. Couldn't find the original so I remade this.
Tom Jøran Sønstebyseter Rønning (@l1v1ng0ffth3l4n) 's Twitter Profile Photo

Last week I attended the #SANS course #SEC660 "Advanced Penetration Testing, Exploit Writing, and Ethical Hacking". The course was very tough and challenging, but fun. I also got my first SANS challenge coin! Very excited about this!

Last week I attended the #SANS course #SEC660 "Advanced Penetration Testing, Exploit Writing, and Ethical Hacking".
The course was very tough and challenging, but fun.
I also got my first SANS challenge coin! Very excited about this!