CrimsonCore (@crimsoncore) 's Twitter Profile
CrimsonCore

@crimsoncore

DFIR - Malware - Cyber Security

ID: 236552237

calendar_today10-01-2011 21:16:04

84 Tweet

92 Followers

799 Following

Nate Guagenti (@neu5ron) 's Twitter Profile Photo

It's here! Zeek log support for the SIGMA Project! Check it out over SOC Prime's uncoder.io. Also, PR for opensource w/ more details than a tweet: github.com/Neo23x0/sigma/…. There will be an introduction and rules in just a few hrs during Roberto Rodriguez 🇵🇪's hackathon

NVISO Labs (@nviso_labs) 's Twitter Profile Photo

Excited to see that Sigma now supports ee-outliers as backend! Start tagging & dashboarding your Sigma hits in Elasticsearch today!🥳 Blog post: blog.nviso.eu/2020/05/14/sig… Thanks for all the work you do Florian Roth ⚡️ Thomas Patzke! #sigma #siem #soc #elk

Chetan Nayak (Brute Ratel C4 Author) (@ninjaparanoid) 's Twitter Profile Photo

#PROTIP: If you can't listen on port 80 during a bind shell, try adding the URI '/Temporary_Listen_Address/' to ur listener. Magic! You don't need administrative privileges to listen on port 80 on Windows anymore #redteam #windows

#PROTIP: If you can't listen on port 80 during a bind shell, try adding the URI '/Temporary_Listen_Address/' to ur listener. Magic! You don't need administrative privileges to listen on port 80 on Windows anymore #redteam #windows
Tim Medin @timmedin.bsky.social 🇺🇦 (@timmedin) 's Twitter Profile Photo

This is a weird and fun little bug found by @julianpentest Cmd Hijack - a command/argument confusion with path traversal in cmd.exe hackingiscool.pl/cmdhijack-comm…

Paul Seekamp (@nullenc0de) 's Twitter Profile Photo

Have a root shell on a *nix system? Need to move laterally? 1) Find processes where people might be logged in. (ps -A) 2) gcore $PID 3) strings core.$PID 4) Read credentials in clear text. NOTE: Some modern OSes protect this. Also, encrypted memory will NOT stop this attack.

Tom Warren (@tomwarren) 's Twitter Profile Photo

the Twitter hacker reportedly got access to Twitter’s admin panel by finding login credentials pinned inside a Twitter Slack channel. If that’s true then holy shit. nytimes.com/2020/07/17/tec…

the Twitter hacker reportedly got access to Twitter’s admin panel by finding login credentials pinned inside a Twitter Slack channel. If that’s true then holy shit. nytimes.com/2020/07/17/tec…
briankrebs (@briankrebs) 's Twitter Profile Photo

Twitter w/ more info on hack. A "small #" of employees "manipulated." 130 accounts targeted, succeeded in tweeting from 45 of them & may have been able to view additional info (read: DMs). On 8 accounts, d/l'd account history using Your Twitter Data tool. blog.twitter.com/en_us/topics/c…

LRQA Cyber Labs (@lrqa_cyber_labs) 's Twitter Profile Photo

Here it is - PoshC2 v7.0. Better comms, payload generation, EDR detection, Docker support and MUCH more. Thanks to Ben Turner 🇬🇧 məˈklaʊd @m0rv4i & many others! labs.nettitude.com/blog/introduci…

Chris Dale (@chrisadale) 's Twitter Profile Photo

A very useful command. This turns Powershell's auto-complete into Linux type autocomplete. Set-PSReadlineKeyHandler -Key Tab -Function Complete

@zephrfish.yxz.red (@zephrfish) 's Twitter Profile Photo

I've spent a few days writing up #ZeroLogon from both a #RedTeam and #BlueTeam perspective to help me expand my #PurpleTeam knowledge, it is very much a sit down and read post blog.zsec.uk/zerologon-atta…

Cisco Talos Intelligence Group (@talossecurity) 's Twitter Profile Photo

Have you checked out our deep dive into Cobalt Strike detection? If not, you're missing out on new Snort and ClamAV rules, and a complete dissection of the tool threat actors are using more every day cs.co/6018GxWiw

Have you checked out our deep dive into Cobalt Strike detection? If not, you're missing out on new Snort and ClamAV rules, and a complete dissection of the tool threat actors are using more every day cs.co/6018GxWiw
brsn (@brsn76945860) 's Twitter Profile Photo

I just wrote a small blogpost on implementing direct syscalls in the #cobaltstrike artifact kit. Using the excellent syswhispers tool by Jackson T. . Writeup at br-sn.github.io/Implementing-S… #redteam

Johnny Shaw (@jxy__s) 's Twitter Profile Photo

My recent contribution to Process Hacker: PH now has "Image Coherency" checks to highlight Herpaderped, Doppelganged, or Hollowed processes. github.com/processhacker/…

My recent contribution to Process Hacker:
PH now has "Image Coherency" checks to highlight Herpaderped, Doppelganged, or Hollowed processes.
github.com/processhacker/…
Mohamed El Azaar (@med0x2e) 's Twitter Profile Photo

An alternative of CS execute-assembly, built with C/C++ and can be used to Load/Inject .NET assemblies &; * Stomping PE DOS headers. * Unlinking .NET (CLR ..etc) modules from PEB. * Static syscalls for bypassing EDR Hooks. more... bit.ly/3rgBlJt d.pr/free/i/USrbQg

Jean (@jean_maes_1994) 's Twitter Profile Photo

🚨 Open to work — AI Security/ red team / adversary sim 8+ yrs in offensive sec, ex-Cobalt Strike, SANS instructor (12 w/y) Looking for flexible, senior/principal roles w/ impact > hours DMs open or connect via: linkedin.com/in/jean-franco…