RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile
RedTeamTacticsAcademy

@redteamtactics

Outsmart, Outmaneuver, Redefine the Tactics
blog šŸ‘‰ posts.redteamtacticsacademy.com
learn šŸ‘‰ masterclass.redteamtacticsacademy.com

ID: 1674863084660293634

linkhttps://masterclass.redteamtacticsacademy.com calendar_today30-06-2023 19:31:23

501 Tweet

4,4K Followers

391 Following

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

EDR Vendor Voldemort: •Shares 0 intel •Demands 100 hours of free R&D •Acts like I’m their intern Anyone else had this delightful experience? Red Teamers, back me up or tell me I need a nap.

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Don’t you think the bar for hiring red teamers is getting low? Lately, I’ve seen more companies feel obligated to build in-house red teams and in the rush, they’re hiring without vetting. Someone gets an OSCP and suddenly they’re a red teamer. But they can’t set up infra. They

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Just got asked to slow down on the red team findings apparently it’s becoming too much for the fix-it side to keep up. Curious where the balance should be: do we ease off, or keep shining light on the risks no matter the load?

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Today I wanna share something that really bothers me: these referral bonus programs at companies can seriously hurt fairness. A close friend an absolute beast in red teaming (I’ve worked with him, I know) applied to a big enterprise software company. Crushed 4 rounds, last one

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Had a very interesting call with the one-that-shall-not-be-named (very famous EDR). They basically said: ā€œYeah, we’re not too worried about downloads. Execution is what matters.ā€ So… downloading malware is fine as long as you don’t run it? That’s like saying shoplifting is cool

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

honestly, this doesn’t need a retweet or praise not because it’s not worthy, but because the work speaks so loudly for itself. just look at this course. look at the update. respect, respect, respect Zero-Point Security . he’s so transparent he even lists the platforms he’s using, so

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

What’s your honest take on Breach and Attack Simulation (BAS)? Some swear by it. Others say it’s just overpriced hype. Some argue it surpasses Purple Teaming; others insist it has nothing to do with Purple Team exercises at all and fits better in other non technical or compliance

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Seen some orgs running split EDR setups like MDE on workstations, CrowdStrike on servers. Not layered, just segmented. From a red team perspective, does this actually make your job harder? Or does it just shift the approach? Curious what folks are seeing in the wild.

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

The EDR-that-shall-not-be-named set the meeting. 30 minutes in… still waiting. If only their detection was as slow as their support. šŸ˜ Funny how fast they were when it was time to demo to the execs.

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

A lot of in-house red teamers I’ve spoken with mention burnout not from engagements, but from the pressure of feeling liable for recommendations. The tough part? Writing them in a way that doesn’t make it seem like their words are gospel because teams fixing the issues often come

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Overheard a heated debate: One guy saw ā€œMachine Learning Identified High-Confidence Malicious Fileā€ in the CrowdStrike dashboard after dropping a file to disk. He goes, ā€œDamn, this new AI is getting dangerous.ā€ The other guy? ā€œNot everything is AI this isn’t AI. Vendors just slap

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Fam, not gonna lie starting to love Netskope šŸ‘€ It’s been giving me a hard time lately… RBI rendering my phishing pages like it’s a YouTube stream

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Curious how effective do you really think honeypot user accounts are? Personally, I’ve had no problem spotting them, but I’m wondering what others think about their actual impact. Are they worth the effort?

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

A threat actor puppeteered an in-house red teamer’s account and wrecked shop. Blue team saw the chaos and said: ā€œOh, it’s probably just the red team being spicy again.ā€ They didn’t look closer. šŸ’” Maybe don’t whitelist the wolf just because it’s in a red hoodie. šŸ“Œ If your

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Someone in a meeting today seriously suggested, ā€œWe should go with QRadar it’s the best SIEM out there.ā€ I didn’t argue. I just quietly dropped off the call like my spirit gave up before I could. šŸ’€

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Anyone here used Torq? Just got access and exploring its potential. From a Red Team perspective, I’m curious how it might support operational workflows like helping surface interesting data or logs that could support R&D and improve offensive capabilities. Would love to hear how