inf0secRabbit (@inf0secrabbit) 's Twitter Profile
inf0secRabbit

@inf0secrabbit

Threat research @Crowdstrike | Ex-Red Team @Mandiant | Profession is passion :) | Tweets are all mine

ID: 986859549037510658

linkhttps://GitHub.com/inf0secRabbit calendar_today19-04-2018 06:50:26

1,1K Tweet

867 Followers

297 Following

PADI (@padi) 's Twitter Profile Photo

🏅 𝗧𝗼𝗽 𝟭𝟬 𝗣𝗼𝘀𝘁𝘀 𝗼𝗳 𝘁𝗵𝗲 𝗬𝗲𝗮𝗿 🤿 9th Place: Has this ever happened to you after an unforgettable encounter? 🥲 🎥 IG 'maysasantoro'

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Windows Exploit Mitigation Series thus far: - Do Not Allow Child Processes: youtu.be/E99S3vCTBWA - Stack Pivot Protection: youtu.be/Wxsq2Goo2tA - Isolated Heaps: youtu.be/5-F_IMpJfHc - High level look at CFG and Heap Spraying: youtu.be/VPwBAGvgX7M

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Token stealing (aka duplication) with syscalls only? Not sure if it’s novel approach but had to try anyway. 🤷‍♂️ NtOpenProcessToken, NtAdjustPrivilegesToken, NtOpenProcess, NtDuplicateToken, and NtSetInformationThread at your service! Enjoy the C code: github.com/gtworek/PSBits…

Token stealing (aka duplication) with syscalls only? Not sure if it’s novel approach but had to try anyway. 🤷‍♂️
NtOpenProcessToken, NtAdjustPrivilegesToken, NtOpenProcess, NtDuplicateToken, and NtSetInformationThread at your service! Enjoy the C code: github.com/gtworek/PSBits…
William R. Messmer (@wmessmer) 's Twitter Profile Photo

If you've ever wanted to live debug user mode Linux processes (e.g.: in WSL) from WinDbg, with 1.2402.24001.0, you can! Start up a gdbserver in WSL (e.g.: gdbserver localhost:1234 ./vim) and connect to it via WinDbg's "Connect to remote debugger"

If you've ever wanted to live debug user mode Linux processes (e.g.: in WSL) from WinDbg, with 1.2402.24001.0, you can!  Start up a gdbserver in WSL (e.g.: gdbserver localhost:1234 ./vim) and connect to it via WinDbg's "Connect to remote debugger"
Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! 

I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis
Jonny Johnson (@jsecurity101) 's Twitter Profile Photo

Without further ado - here is EtwInspector! This is a C++ tool to help users interact with ETW providers. This tool supports the enumeration of providers, their events, and capture events. github.com/jsecurity101/E…

Sajal Thomas (@sajal_thomas) 's Twitter Profile Photo

Essential reading in light of all the misinformation spreading around here about what went down. Be nice to your sysadmins and IT staff for a while. crowdstrike.com/blog/technical…

Tavis Ormandy (@taviso) 's Twitter Profile Photo

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n
CrowdStrike (@crowdstrike) 's Twitter Profile Photo

CrowdStrike continues to focus on restoring all systems as soon as possible. Of the approximately 8.5 million Windows devices that were impacted, a significant number are back online and operational. Together with customers, we tested a new technique to accelerate impacted

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

Update: Our preliminary Post Incident Review (PIR) is available at the link below.  Details include the incident overview, remediation actions, and preliminary learnings. More to come in our full Root Cause Analysis (RCA). Automated recovery techniques, coupled with strategic

Alex Ionescu (@aionescu) 's Twitter Profile Photo

It’s wonderful to see what Xeno Kovah and his collaborators have built for the community. I always recommend OST2 for my new hires and other juniors, or just anyone trying to get started on a new topic. The courses are excellent. It’s an honor to sponsor the Windows Security Path

It’s wonderful to see what <a href="/XenoKovah/">Xeno Kovah</a> and his collaborators have built for the community. I always recommend OST2 for my new hires and other juniors, or just anyone trying to get started on a new topic. The courses are excellent. It’s an honor to sponsor the Windows Security Path
CrowdStrike (@crowdstrike) 's Twitter Profile Photo

💡 Today we are unveiling a new China-nexus adversary: LIMINAL PANDA. 👉 Our blog post contains deeper insights into LIMINAL PANDA’s operational profile and key TTPs, as well as guidance for organizations to defend against this sophisticated adversary: crwdstr.ke/6010sUQwM

💡 Today we are unveiling a new China-nexus adversary: LIMINAL PANDA.

👉 Our blog post contains deeper insights into LIMINAL PANDA’s operational profile and key TTPs, as well as guidance for organizations to defend against this sophisticated adversary: crwdstr.ke/6010sUQwM
CrowdStrike (@crowdstrike) 's Twitter Profile Photo

📣 Today we are excited to launch #CrowdStrike Insider Risk Services to help organizations anticipate, detect and respond to insider threats. Full details: crwdstr.ke/6014aZPQE

Makhachev Islam (@makhachevmma) 's Twitter Profile Photo

"What does this title represent? It means you're the best in the world and if you're the best in the world, it doesn't matter who's going to be standing across from you. What do I say? No? NEVER. Let's do this!"

"What does this title represent? It means you're the best in the world and if you're the best in the world, it doesn't matter who's going to be standing across from you. What do I say? No? NEVER. Let's do this!"
Full Violence ™ (@full_violence) 's Twitter Profile Photo

From the favelas to the world. He was never supposed to make it this far, sick as a kid, counted out always, 10-8 start to his UFC career. Win or lose, his story already inspired millions. We love you, Charles. ❤️

From the favelas to the world. He was never supposed to make it this far, sick as a kid, counted out always, 10-8 start to his UFC career. Win or lose, his story already inspired millions. We love you, Charles. ❤️