Mike Jankowski-Lorek (@mjl_pl) 's Twitter Profile
Mike Jankowski-Lorek

@mjl_pl

ID: 781813368487378944

calendar_today30-09-2016 11:10:07

77 Tweet

352 Followers

256 Following

CQURE Academy (@cqureacademy) 's Twitter Profile Photo

Are you curious about the story behind 🥝🏳️‍🌈 Benjamin Delpy's #Mimikatz, the tool playing with Windows security? Watch Paula Januszkiewicz's interview with Benjamin Delpy and #stayCQURE! cqu.re/2m2nKbH

Jeffrey Snover (@jsnover) 's Twitter Profile Photo

This thing just keeps getting better and better. For years people would complain that PowerShell sucked because ... and then the issue would be about the console. I’ll be glad to see those day’s in my rear-view mirror.

Gokan Ozcifci (@xgokan) 's Twitter Profile Photo

We did almost hit de 200 attendees for our #TableTalk at #MSIgnite! One thing the panellists and attendees will remember is that no matter which technology - it's always about 'people' 😊

We did almost hit de 200 attendees for our #TableTalk at #MSIgnite! One thing the panellists and attendees will remember is that no matter which technology - it's always about 'people' 😊
🥝🏳️‍🌈 Benjamin Delpy (@gentilkiwi) 's Twitter Profile Photo

It's time to play with #mimikatz🥝& #kekeo🐤& #impacket If you have a Windows PKI with its WebServer, you'll have problems🤪 No authentication/credential to *full domain owned* > github.com/gentilkiwi/mim… > github.com/gentilkiwi/kek… 👍topotam EFS & PetitPotam 👍Ex Android Dev PR

RSA Conference (@rsaconference) 's Twitter Profile Photo

In this recorded #RSAC webcast, watch as Paula Januszkiewicz & Mike Jankowski-Lorek demonstrate how hackers bypass MFA to attack modern authentication protocols, and misuse WHfB and other software. Get the full video here: spr.ly/6012ymqqa

In this recorded #RSAC webcast, watch as <a href="/PaulaCqure/">Paula Januszkiewicz</a> &amp; <a href="/MJL_PL/">Mike Jankowski-Lorek</a> demonstrate how hackers bypass MFA to attack modern authentication protocols, and misuse WHfB and other software. Get the full video here: spr.ly/6012ymqqa
OWASP Top10 (@owasptop10) 's Twitter Profile Photo

The @OWASP Top 10 team is extremely proud to share the draft OWASP Top 10 2021 for peer review, comment, translation, and suggestions for improvements. We are working on a graphic redesign and a surprise extra for the 20th Anniversary on September 24! owasp.org/Top10/

Ari Eitan (@arieitan) 's Twitter Profile Photo

New Cobalt Strike beacon for Linux, fully undetected in VT. Has Windows implementation as well, both written from scratch. Victims including telecommunications, government, and finance sectors Full report here - intezer.com/blog/malware-a… Avigayil Mechtinger Joakim Kennedy 🔥🔥

New Cobalt Strike beacon for Linux, fully undetected in VT. Has Windows implementation as well, both written from scratch. Victims including telecommunications, government, and finance sectors

Full report here - 
intezer.com/blog/malware-a…

<a href="/AbbyMCH/">Avigayil Mechtinger</a> <a href="/joakimkennedy/">Joakim Kennedy</a> 🔥🔥
Nir Ohfeld (@nirohfeld) 's Twitter Profile Photo

Microsoft just patched 4 vulnerabilities we (Wiz) recently reported, including a CVSS 9.8 RCE. These vulnerabilities affect countless machines as the OMI agent is silently installed when enabling many Azure services. #PatchTuesday wiz.io/blog/omigod-cr…

Samir (@sbousseaden) 's Twitter Profile Photo

when it comes to lsass cred access monitoring, we all focus on the targetimage is lsass, what about the other direction? MirrorDump defaults traces is a good example (PROCESS_DUP_HANDLE+source Image is lsass + Unknown CallTrace) github.com/elastic/detect… github.com/CCob/MirrorDump

when it comes to lsass cred access monitoring, we all focus on the targetimage is lsass, what about the other direction?  MirrorDump defaults traces is a good example (PROCESS_DUP_HANDLE+source Image is lsass + Unknown CallTrace)

github.com/elastic/detect…

github.com/CCob/MirrorDump
Jann Horn - jann@infosec.exchange (@tehjh) 's Twitter Profile Photo

new blogpost: "How a simple Linux kernel memory corruption bug can lead to complete system compromise: An analysis of current and potential kernel security mitigations" I'll post a copy to the kernel-hardening list later in case folks want to discuss it. googleprojectzero.blogspot.com/2021/10/how-si…

Paula Januszkiewicz (@paulacqure) 's Twitter Profile Photo

I’m excited to share 3 memory analysis demos and teach you the exact tools and techniques I use daily to help big corporations recover from a #cyberattack. Join me in our new 3-hour #Cyberbytes virtual training, “Memory Dump Analysis” and #staycqure #CyberSecurity

NSA Cyber (@nsacyber) 's Twitter Profile Photo

Great news! A new version of D3FEND is now available at d3fend.mitre.org. D3FEND enables other cyber professionals to tailor defenses against specific cyber threats and reduce a system's potential attack surface. Learn more about D3FEND here: nsa.gov/Press-Room/Pre…

Black Hat (@blackhatevents) 's Twitter Profile Photo

In #BHASIA Training "Advanced Hacking and Securing Windows Infrastructure (Virtual)" Paula Januszkiewicz Mike Jankowski-Lorek and CQURE Academy will teach students how to identify vulnerabilities and reduce false positives with manual vulnerability verification techniques >> bit.ly/3HR7Qrg

In #BHASIA Training "Advanced Hacking and Securing Windows Infrastructure (Virtual)" <a href="/PaulaCqure/">Paula Januszkiewicz</a> <a href="/MJL_PL/">Mike Jankowski-Lorek</a> and <a href="/CQUREAcademy/">CQURE Academy</a> will teach students how to identify vulnerabilities and reduce false positives with manual vulnerability verification techniques &gt;&gt; bit.ly/3HR7Qrg
Mike Jankowski-Lorek (@mjl_pl) 's Twitter Profile Photo

Join me and Paula for a LIVE webinar: "From Zero to Hero: Effective Escalation Paths to Domain Admin.” Learn to exploit system vulnerabilities, certificate permissions, and legacy solutions for domain access. Book now: cqureacademy.com/webinars/escal…

Join me and Paula for a LIVE webinar: "From Zero to Hero: Effective Escalation Paths to Domain Admin.” Learn to exploit system vulnerabilities, certificate permissions, and legacy solutions for domain access. Book now: cqureacademy.com/webinars/escal…