Jareth (@hackinggoblin) 's Twitter Profile
Jareth

@hackinggoblin

Just a dude that loves infosec, video games, music, and cartoons. HACK THE PLANET! My opinions are my own.

ID: 2419684970

calendar_today30-03-2014 23:59:47

186 Tweet

127 Followers

249 Following

InGuardians™ (@inguardians) 's Twitter Profile Photo

Ready to take your penetration testing career to the next level? InGuardians is looking for talented Senior Security Consultants to join our Offensive Services Team. #infosecjobs Apply here: inguardians.com/jobs/

Elliot (@elliotkillick) 's Twitter Profile Photo

Need to go under the radar downloading #mimikatz (and other suspect payloads)? Then newly discovered #lolbin "C:\Windows\System32\Cmdl32.exe" (signed by MS) is for you. It's like a new certutil.exe but absolutely unheard of by any antivirus software!

CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 (@_ethicalchaos_) 's Twitter Profile Photo

Another weekend or so left and lsarelayx should be at least ready for lab testing. In the meantime checkout the latest feature. Kerberos -> NTLM downgrade, so even clients attempting to connect with Kerberos will be forced to use NTLM.

Lesley Carhart (@hacks4pancakes) 's Twitter Profile Photo

Everyone is tired. The adults are tired. The kids are tired. The teachers are tired. The students are tired. Everyone is just tired, and companies and leaders just don’t seem to notice.

Chris Thompson (@_mayyhem) 's Twitter Profile Photo

Check out my new post about coercing NTLM authentication from the local admin accounts used by SCCM servers, how to prevent it, and the release of SharpSCCM, a C# tool that can be used to demonstrate the impact of these techniques: posts.specterops.io/coercing-ntlm-…

Black Hat (@blackhatevents) 's Twitter Profile Photo

In this hands-on #BHASIA Training from Jay Beale & InGuardians™, you'll access their cloud training environment - a Kali Linux system filled with capture-the-flag virtual machines and a Kubernetes cluster, which you will attack & defend. Learn more: informatech.co/3JLfIJk

Christopher Peacock (@securepeacock) 's Twitter Profile Photo

Reminder: "Unless your use scenarios explicitly require them, Microsoft recommends that you block the following applications." docs.microsoft.com/en-us/windows/…

Reminder: "Unless your use scenarios explicitly require them, Microsoft recommends that you block the following applications."
docs.microsoft.com/en-us/windows/…
InGuardians™ (@inguardians) 's Twitter Profile Photo

Our Senior Security Consultant Ray Ancel Lancelot4 wrote an excellent blog post on the topic of ethics in #socialengineering exercises. Read here: inguardians.com/blog/ethics-an…

InGuardians™ (@inguardians) 's Twitter Profile Photo

This workshop filled up quick! We have added 5 additional seats! Learn about #Kubernetes from our CEO Jay Beale & get support as you remotely control a #Kali system & a 3-node cluster. Thursday, June 9, 12PM - 1:30PM PT Register here: forms.gle/oz2cPrGR33f5p9…

InGuardians™ (@inguardians) 's Twitter Profile Photo

Special Prize Question: What generic feature in popular post exploitation frameworks allow you to route traffic inside your target’s network? First 10 people with the right answer will get a limited edition prize. In-person only:)

Brandon Rudolph (@donquix0t3) 's Twitter Profile Photo

Check out my latest article: KillNet: The Pro-Russian Hacker Group Taking Aim At More Than Just U.S. Hospitals linkedin.com/pulse/killnet-… via LinkedIn

InGuardians™ (@inguardians) 's Twitter Profile Photo

Embark on an #infosec journey with our three-part blog series written by Jon Studebaker Jon Studebaker. Part 1 covers learning approaches, infosec resources, community engagement, & work/life balance tips. Stay tuned for Part 2 and 3! hubs.li/Q02fRRQD0

Embark on an #infosec journey with our three-part blog series written by Jon Studebaker <a href="/studebacon/">Jon Studebaker</a>.
Part 1 covers learning approaches, infosec resources, community engagement, &amp; work/life balance tips. Stay tuned for Part 2 and 3! 
hubs.li/Q02fRRQD0