Bojan Zdrnja (@bojanz) 's Twitter Profile
Bojan Zdrnja

@bojanz

IT Security guy, penetration testing is my thing. One of the SANS Internet Storm Center handlers at isc.sans.org. SANS SEC542 instructor and course co-author.

ID: 21474216

linkhttps://www.infigo.hr calendar_today21-02-2009 09:42:17

2,2K Tweet

4,4K Followers

689 Following

Bojan Zdrnja (@bojanz) 's Twitter Profile Photo

Wrote a short diary about some reversing I did on the #xz #xzbackdoor at isc.sans.edu/diary/30802 SANS.edu Internet Storm Center with a bit more explanation of few functions.

BSidesZagreb (@bsideszagreb) 's Twitter Profile Photo

Greetings cybersecurity collective, lectures (bsideszagreb.srce.hr/schedule/) and photos (flickr.com/photos/srcehr/…) are available. Deep appreciation to our exceptional lecturers, sponsors, and attendees! Powered by Srce Sponsored by Help Net Security and Diverto security #bsides

Greetings cybersecurity collective,
lectures (bsideszagreb.srce.hr/schedule/) and photos (flickr.com/photos/srcehr/…) are available.

Deep appreciation to our exceptional lecturers, sponsors, and attendees!

Powered by <a href="/SrceHr/">Srce</a> 
Sponsored by <a href="/helpnetsecurity/">Help Net Security</a> and <a href="/Divertosecurity/">Diverto security</a> 

#bsides
SANS Institute (@sansinstitute) 's Twitter Profile Photo

🚨 #WJAI Special Episode: Unpacking the xz-utils Backdoor Crisis! Tune in tomorrow as SANS experts Johannes Ullrich & Bojan Zdrnja dissect the threat that has shaken the open-source community. Set your alert now ▶️ youtube.com/live/HTNKS3tw3…

🚨 #WJAI Special Episode: Unpacking the xz-utils Backdoor Crisis!

Tune in tomorrow as SANS experts <a href="/johullrich/">Johannes Ullrich</a> &amp; <a href="/bojanz/">Bojan Zdrnja</a> dissect the threat that has shaken the open-source community.

Set your alert now ▶️  youtube.com/live/HTNKS3tw3…
SANS Institute, EMEA (@sansemea) 's Twitter Profile Photo

🤝 Strengthen your defenses & advance EU SANS NIS 2 research Bojan Zdrnja explains, “By participating, orgs take a significant step towards bolstering their defenses " ✍️ Complete the survey now → sans.org/u/1vtf #SANSTraining #Cybersecurity #NIS2 #Compliance

🤝 Strengthen your defenses &amp; advance EU SANS NIS 2 research

<a href="/bojanz/">Bojan Zdrnja</a> explains, “By participating, orgs take a significant step towards bolstering their defenses "

✍️ Complete the survey now → sans.org/u/1vtf

#SANSTraining #Cybersecurity #NIS2 #Compliance
SANS Institute, EMEA (@sansemea) 's Twitter Profile Photo

💬 Be part of the solution: Take the EU NIS 2 Survey and chart the cybersecurity course ✍️ Take the lead – Your insights can drive change. Share your thoughts by 10 May → sans.org/u/1vtf Dean Parsons Bojan Zdrnja | #SANSTraining #Cybersecurity #NIS2 #Compliance

💬 Be part of the solution: Take the EU NIS 2 Survey and chart the cybersecurity course

✍️ Take the lead – Your insights can drive change. Share your thoughts by 10 May → sans.org/u/1vtf

<a href="/deancybersec/">Dean Parsons</a> <a href="/bojanz/">Bojan Zdrnja</a> | #SANSTraining #Cybersecurity #NIS2 #Compliance
SANS Institute (@sansinstitute) 's Twitter Profile Photo

📣 Starting in 15 Min! | Join us for #SANSAiForum to hear firsthand accounts of how SANS Faculty are using #AI to make significant advancements in #cybersecurity w/ talks from Mick Douglas 🇺🇦🌻 sethmisenar Jorge Orchilles Tim Schulz & more! Register/Join: sans.org/u/1uVn

📣 Starting in 15 Min! | Join us for #SANSAiForum to hear firsthand accounts of how SANS Faculty are using #AI to make significant advancements in #cybersecurity w/ talks from <a href="/bettersafetynet/">Mick Douglas 🇺🇦🌻</a> <a href="/sethmisenar/">sethmisenar</a> <a href="/jorgeorchilles/">Jorge Orchilles</a> <a href="/teschulz/">Tim Schulz</a> &amp; more!

Register/Join: sans.org/u/1uVn
SANS.edu Internet Storm Center (@sans_isc) 's Twitter Profile Photo

Several classes at #SANSFIRE are led by SANS.edu Internet Storm Center handlers: SEC542 Web Pentesting Bojan Zdrnja FOR610 Rev Malware Xavier Mertens @[email protected] 🇧🇪 SEC522 Defending Web Apps Johannes Ullrich We also have some great additional events exclusive for live attendees. See you in July! In person!

SANS Cybersecurity Leadership (@secleadership) 's Twitter Profile Photo

⏳ Time's ticking: Share your thoughts on EU cybersecurity regulations! Take part in the essential survey by Dean Parsons and Bojan Zdrnja to guide industries through new Directives. ✍️ Lend your voice → sans.org/u/1vtf #SANSTraining #Cybersecurity #NIS2 #Compliance

⏳ Time's ticking: Share your thoughts on EU cybersecurity regulations!

Take part in the essential survey by <a href="/deancybersec/">Dean Parsons</a> and <a href="/bojanz/">Bojan Zdrnja</a> to guide industries through new Directives. 

✍️  Lend your voice → sans.org/u/1vtf

#SANSTraining #Cybersecurity #NIS2 #Compliance
Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Quick Hackfest Hollywood keynote announcement: Day One Keynote: David Weston (David Weston (DWIZZZLE)) Day Two Keynote: Yarden Shafir (Yarden Shafir) October 28th & 29th in Los Angeles! Register for virtual (free) & in-person attendance here: sans.org/cyber-security…

SANS Institute, EMEA (@sansemea) 's Twitter Profile Photo

🇪🇺 Orgs are quickly running out of time to prepare for new EU #NIS2 regulations. SANS expert Bojan Zdrnja emphasises, "Early prep is crucial." Start your journey to compliance with SANS → sans.org/u/1wi8 Read more → csoonline.com/article/210596… #SANSTraining #Compliance

SANS ICS (@sansics) 's Twitter Profile Photo

⚠️ Deadline extended: Participate in the SANS Institute survey by Dean Parsons and Bojan Zdrnja to prepare your organisation. 1️⃣ Take the survey → sans.org/u/1vtf 2️⃣ Complete the questions 3️⃣ Submit by 31 May #SANSTraining #Cybersecurity #NIS2 #Compliance

⚠️ Deadline extended: Participate in the <a href="/SANSInstitute/">SANS Institute</a> survey by <a href="/deancybersec/">Dean Parsons</a> and <a href="/bojanz/">Bojan Zdrnja</a> to prepare your organisation.

1️⃣ Take the survey → sans.org/u/1vtf
2️⃣ Complete the questions
3️⃣ Submit by 31 May

#SANSTraining #Cybersecurity #NIS2 #Compliance
Bojan Zdrnja (@bojanz) 's Twitter Profile Photo

If you are into web application penetration testing make sure that you read the new blog by my talented colleague Mateo Hanžek who wrote about some novel event handler XSS techniques that can be used to bypass WAF's too :)

SANS Institute (@sansinstitute) 's Twitter Profile Photo

🇪🇺 Navigate NIS2 Directive: Key Compliance Tips for EU Businesses Catch our webcast with Dean Parsons & Bojan Zdrnja, to understand & comply with the new regs 🎦 Watch now → youtu.be/eaOpc1fU3YQ?si… ℹ️ Prepare with our resource hub → sans.org/u/1xEu #SANSTraining #NIS2

🇪🇺 Navigate NIS2 Directive: Key Compliance Tips for EU Businesses

Catch our webcast with <a href="/deancybersec/">Dean Parsons</a> &amp; <a href="/bojanz/">Bojan Zdrnja</a>, to understand &amp; comply with the new regs

🎦 Watch now → youtu.be/eaOpc1fU3YQ?si…
ℹ️ Prepare with our resource hub → sans.org/u/1xEu

#SANSTraining #NIS2
Bojan Zdrnja (@bojanz) 's Twitter Profile Photo

Have AllExtendedRights on a computer object? Besides reading its LAPS password, you can also reset its account password and takeover the target computer. Downside - you'll break its AD membership. Kudos to Luka Srdarev for exploiting this in a recent engagement :-) #RT

Have AllExtendedRights on a computer object? Besides reading its LAPS password, you can also reset its account password and takeover the target computer. Downside - you'll break its AD membership.

Kudos to <a href="/burw0r/">Luka Srdarev</a> for exploiting this in a recent engagement :-) 

#RT
Bojan Zdrnja (@bojanz) 's Twitter Profile Photo

Interesting how signature matching in Microsoft Defender is so sensitive regarding anything related to keyword "defender". So while bypassing such detection is tedious and annoying, it can still be done quite easily, as shown below.

Interesting how signature matching in Microsoft Defender is so sensitive regarding anything related to keyword "defender". So while bypassing such detection is tedious and annoying, it can still be done quite easily, as shown below.
Bojan Zdrnja (@bojanz) 's Twitter Profile Photo

New diary: how Credential Guard prevented extraction of TGT from a service ticket by abusing Benjamin Deply's trick and why you should aim to enable it everywhere. Read the SANS.edu Internet Storm Center diary at isc.sans.edu/diary/Credenti…

Bojan Zdrnja (@bojanz) 's Twitter Profile Photo

Ooh finally a new diary. This time about why attackers wanted to steal Machine Keys in #SharePoint attacks 2 weeks ago. Read all the details about IIS and Machine Keys in my latest diary at isc.sans.edu/diary/Stealing…