Kijo Ninja (@kj_ninja25) 's Twitter Profile
Kijo Ninja

@kj_ninja25

Security PM @Microsoft - Microsoft Defender XDR, Kijo Ninja 🥷 #修行中 - learning C/C++ #Triathlete 🏊‍♂️ 🚴 🏃‍♀️ My tweets are my own

ID: 1634542242399657985

linkhttps://github.com/LearningKijo/KQL calendar_today11-03-2023 13:10:57

773 Tweet

2,2K Followers

94 Following

Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

New table in Advanced Hunting 🎯 OAuthAppInfo table contains information about Microsoft 365-connected OAuth applications !! Make sure you enabled MDA App Governance !! learn.microsoft.com/en-us/defender…

Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

Hi everyone I just created an account in Medium - kijoninja.medium.com 🔥🔥🔥 I will publish first blog tomorrow - my security journey:) Stay tuned 🎯

Hi everyone 
I just created an account in Medium - kijoninja.medium.com 🔥🔥🔥 I will publish first blog tomorrow - my security journey:) Stay tuned 🎯
Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

NEW BLOG 🎉 My first blog on Medium - my security journey and what I have been doing over the past few years. ✅First blog : kijoninja.medium.com/kijo-ninja-my-… The next blog will cover the fundamentals of DLL injection.

Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

Hello defender folks I recently created a Medium account and have started posting blogs little by little. If you're curious, feel free to check it out !! ✅ Account : kijoninja.medium.com My next post will cover DLL injection — stay tuned 🔥🔥🔥

Hello defender folks 
I recently created a Medium account and have started posting blogs little by little. If you're curious, feel free to check it out !!

✅ Account : kijoninja.medium.com

My next post will cover DLL injection — stay tuned 🔥🔥🔥
Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

Hello defenders Yes it’s a new blog - DLL injection part 1 🎯🎯🎯 ✅ Blog : kijoninja.medium.com/dll-injection-… I am writing part2, and 3 !! Stay tuned 🔥

Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

Hello everyone !! I’ll be posting Part 2 of my DLL injection blog this week 🚀🚀🚀 Hope you enjoyed Part 1. If you missed it, you can check it out here - systemweakness.com/dll-injection-… Stay tuned 🎯 #security #cybersecurity #edr #epp

Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

New Blog - DLL injection Part 2 🎉 ✅ Blog : kijoninja.medium.com/dll-injection-… 🚀 Kicking off my coding journey step by step !! Starting with the basics—grabbing Notepad’s PID using C and the Windows API. 🔜 Up next in Part 3: Completed DLL Injection in action. Stay tuned !!

Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

Curious about DLL injection 🚀🚀🚀 In Part 2 of the blog, I covered the function that retrieves the Notepad PID to load the DLL file. If you missed it, you can check out Part 2 here 👉 : systemweakness.com/dll-injection-… #Security #EndpointSecurity

Curious about DLL injection 🚀🚀🚀

In Part 2 of the blog, I covered the function that retrieves the Notepad PID to load the DLL file. If you missed it, you can check out Part 2 here 👉 : systemweakness.com/dll-injection-…

#Security #EndpointSecurity
Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

According to Microsoft research, the education sector is more likely to face identity-related attacks🎯 In fact, 44% of these accounts were never re-enabled after disruption actions were taken.... ⚠️⚠️⚠️ ✅Blog : techcommunity.microsoft.com/blog/microsoft… #HolidayLearning

Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

During my holiday, I had the chance to learn about DLL injection and wrote three blog posts documenting my step-by-step learning process 🎯 If you’re curious, feel free to check them out! ✅ Blog : kijoninja.medium.com #Holidaylearning #EndpointSecurity

During my holiday, I had the chance to learn about DLL injection and wrote three blog posts documenting my step-by-step learning process 🎯 If you’re curious, feel free to check them out!

✅ Blog : kijoninja.medium.com

#Holidaylearning #EndpointSecurity
Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

New Blog - BEC Starts Here: Tracing the First Entry Technique 🎉 I had a chance to explore common BEC entry points and initial access techniques 🎯, highlighting email threat trends from the past 5 years. If you’re curious, feel free to check it out !! osintteam.blog/bec-starts-her…

Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

Hello security folks Great report on recent identity-based attack techniques by Microsoft Threat Intelligence 🎯 ✔️ #AiTM credential phishing ✔️ Device code phishing ✔️ #OAuth consent phishing ✔️ Device join phishing ✔️ #QRcode ✔️ Teams phishing like teams phisher microsoft.com/en-us/security…

Speaker 25 (@rodtrent) 's Twitter Profile Photo

Common Mistakes in PowerShell & How to Avoid Them: Debugging Strategies for Typical Pitfalls myitforum.substack.com/p/common-mista… #PowerShell #myITforum

Common Mistakes in PowerShell & How to Avoid Them: Debugging Strategies for Typical Pitfalls myitforum.substack.com/p/common-mista…

#PowerShell #myITforum
Microsoft Security (@msftsecurity) 's Twitter Profile Photo

Attackers are getting smarter, but so are we. See Microsoft Defender for Endpoint in action and learn how to supercharge endpoint security at your organization: msft.it/6014SlCCq #ThreatIntelligence

Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

During the holidays, I’ve been catching up on recent AI security developments, especially from a threat perspective. I’m studying AI jailbreaks and writing a blog to reflect on what I’ve learned.

Kijo Ninja (@kj_ninja25) 's Twitter Profile Photo

Do you want to know how BEC attacks maintain persistence and exfiltrate your data? 🎯 ✅ Blog : osintteam.blog/bec-persistenc… Writing about a forwarding rule creation, detection, investigation and so on !! If you're curious, please check it out on my tech blog 🚀