Anton Kutepov (@aw350m33) 's Twitter Profile
Anton Kutepov

@aw350m33

Security Researcher @attackdetection | Threat Hunting | Network Forensics | @oscd_initiative

ID: 1106974619125334017

calendar_today16-03-2019 17:44:50

40 Tweet

38 Followers

109 Following

OSCD (@oscd_initiative) 's Twitter Profile Photo

here is a way to show your support and send kudos to all hard workers that contributed to sigma, Red Canary, a Zscaler company Atomic Red Team, and TheHive projects during the OSCD sprints! subscribe and share the list: x.com/i/lists/130895… #EUATTACKworkshop

here is a way to show your support and send kudos to all hard workers that contributed to <a href="/sigma_hq/">sigma</a>, <a href="/redcanary/">Red Canary, a Zscaler company</a> Atomic Red Team, and <a href="/TheHive_Project/">TheHive</a> projects during the OSCD sprints! subscribe and share the list:

x.com/i/lists/130895…

#EUATTACKworkshop
Johnny Shaw (@jxy__s) 's Twitter Profile Photo

I’m pleased to present this Windows exploit. Process Herpaderping is a method for evading detection - similar to process migration, hollowing, or doppelganging. herpaderping.com

Samir (@sbousseaden) 's Twitter Profile Photo

example of initial execution traces (sysmon) of ProcessHerpaderping uploaded jxy-s.github.io/herpaderping/ github.com/sbousseaden/EV…

example of initial execution traces (sysmon) of ProcessHerpaderping uploaded

jxy-s.github.io/herpaderping/

github.com/sbousseaden/EV…
Attack Detection (@attackdetection) 's Twitter Profile Photo

One another Oracle #WebLogic RCE vuln. It scores CVSS 9.8 and needs no authentication. We published #suricata rule to detect CVE-2020-14882 in our github: github.com/ptresearch/Att…

Teymur (@heirhabarovt) 's Twitter Profile Photo

Want to know how to hunt for Zerologon? My team prepared this article for you! bi-zone.medium.com/hunting-for-ze… #BIZONE #zerologon #vulnerability #secops #microsoft

PT ESC (@ti_esc) 's Twitter Profile Photo

Join to our colleague speech "From Old Higaisa Samples to New Winnti Backdoor: The Story of One Research" standoff365.com/conferences/25… #winnti #apt

Jon Hencinski (@jhencinski) 's Twitter Profile Photo

Super excited to share that we've updated the Expel #mindmap on detection and response in #AWS. Via the link below you'll receive: - Expel AWS mindmap - defender's cheat sheet in AWS - a blank mind map so you can build your own! expel.io/blog/mind-map-…

Super excited to share that we've updated the <a href="/expel_io/">Expel</a>  #mindmap on detection and response in #AWS. 

Via the link below you'll receive: 
- <a href="/expel_io/">Expel</a> AWS mindmap 
- defender's cheat sheet in AWS
- a blank mind map so you can build your own!
 
expel.io/blog/mind-map-…
Andy Robbins (@_wald0) 's Twitter Profile Photo

Tomorrow, Rohan Vazarkar and I are releasing the newest version of #BloodHound: 4.0. See the new features, new GUI, and new attack primitives first during our SO-CON presentation called "Six Degrees of Global Admin". Register here: specterops.io/so-con2020/eve…

Tomorrow, <a href="/CptJesus/">Rohan Vazarkar</a> and I are releasing the newest version of #BloodHound: 4.0. See the new features, new GUI, and new attack primitives first during our SO-CON presentation called "Six Degrees of Global Admin". Register here: specterops.io/so-con2020/eve…
Alexey Vishnyakov (@vishnyak0v) 's Twitter Profile Photo

After months of multiple approvals I'm happy to share with you our investigation details in the Russian media company about collaboration between the #APT group and #ransomware operator. ptsecurity.com/ww-en/analytic… #EmissaryPanda #APT27 #BronzeUnion #LuckyMouse

sigma (@sigma_hq) 's Twitter Profile Photo

We've transferred Florian Roth ⚡️'s repository into SigmaHQ's organisation account Next steps: ./rules > separate repo ./tools > separate repo Add the 2 new repos as sub repos in the original one github.com/SigmaHQ/sigma/

We've transferred <a href="/cyb3rops/">Florian Roth ⚡️</a>'s repository into SigmaHQ's organisation account

Next steps:
./rules &gt; separate repo 
./tools &gt; separate repo
Add the 2 new repos as sub repos in the original one 

github.com/SigmaHQ/sigma/
Thomas Patzke (@blubbfiction) 's Twitter Profile Photo

As preparation for the huge OSCD merge and for better differentiation Sigma gets a new "informational" severity level: github.com/SigmaHQ/sigma/… Rules ranked with "informational" are not intended to generate cases or alerts, but they are very useful to enrich or tag events!

As preparation for the huge OSCD merge and for better differentiation Sigma gets a new "informational" severity level:

github.com/SigmaHQ/sigma/…

Rules ranked with "informational" are not intended to generate cases or alerts, but they are very useful to enrich or tag events!
Thomas Patzke (@blubbfiction) 's Twitter Profile Photo

Just merged the huge OSCD pull request into the Sigma master branch. Lots of new and improved rules. Big thanks to all contributors, it was a pleasure to review!

🥝🏳️‍🌈 Benjamin Delpy (@gentilkiwi) 's Twitter Profile Photo

Very (very) soon in #mimikatz 🥝 Client RDP passwords/PIN in MSTSC process, decrypted. Without previous injection/hook in process, of course😉 Especially useful on jump servers🤪 ~ Can also be used to debug some internal properties ~

Very (very) soon in #mimikatz 🥝
Client RDP passwords/PIN in MSTSC process, decrypted.

Without previous injection/hook in process, of course😉

Especially useful on jump servers🤪

~ Can also be used to debug some internal properties ~
Attack Detection (@attackdetection) 's Twitter Profile Photo

Use our #suricata rules to detect both #PrintNightmare (CVE-2021-1675) exploits. Adding printer driver across the network is rare but still possible case, so there might be a few of false alerts. Tell us if you get some. github.com/ptresearch/Att…

OSCD (@oscd_initiative) 's Twitter Profile Photo

OSCD: Simulation, Detection & Response Sprint #2 Summary has been published. Thanks to all the participants and those who helped with it! Stay tuned! #ThreatIntel #ThreatHunting #ThreatDetection #BlueTeam Links: [EN] medium.com/oscd/oscd-spri… [RU] habr.com/ru/post/576448/

PositiveTechnologies (@ptsecurity) 's Twitter Profile Photo

Акции ПАО «Группа Позитив» начнут торговаться на Мосбирже 17 декабря с 11:00. Ищите нас по тикеру POSI. Рассчитываем привлечь талантливых людей индустрии и создать сплоченное сообщество единомышленников-совладельцев. Подробнее: bit.ly/3F1bqvz

Акции ПАО «Группа Позитив» начнут торговаться на Мосбирже 17 декабря с 11:00. Ищите нас по тикеру POSI. Рассчитываем привлечь талантливых людей индустрии и создать сплоченное сообщество единомышленников-совладельцев. Подробнее: bit.ly/3F1bqvz