Martin Korman (@martinkorman) 's Twitter Profile
Martin Korman

@martinkorman

Malware Analyst and Forensic Investigator. Tweets represent my own opinion. I'm active on Mastodon: Find me on infosec.exchange/@0xducky

ID: 392260336

linkhttps://medium.com/dfir-dudes calendar_today16-10-2011 19:31:43

1,1K Tweet

806 Followers

381 Following

Alex Xu (@alexxubyte) 's Twitter Profile Photo

/1 How do Apple Pay and Google Pay handle sensitive card info? The diagram below shows the differences. Both approaches are very secure, but the implementations are different. To understand the difference, we break down the process into two flows.

/1 How do Apple Pay and Google Pay handle sensitive card info?

The diagram below shows the differences. Both approaches are very secure, but the implementations are different. To understand the difference, we break down the process into two flows.
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

Fox-IT just open sourced their enterprise forensics tooling dissect. This is a big project that some of the smartest people I know have worked on. It supports many filesystems and file formats, all as Python libraries. Docs: docs.dissect.tools / code: github.com/fox-it/dissect

Fox-IT just open sourced their enterprise forensics tooling dissect. This is a big project that some of the smartest people I know have worked on. It supports many filesystems and file formats, all as Python libraries. Docs: docs.dissect.tools / code: github.com/fox-it/dissect
Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

Slides also detail an 0day in Parallel's macOS installer, that affords a local unprivileged attacker or malware, root privs! 🔓👀

Slides also detail an 0day in Parallel's macOS installer, that affords a local unprivileged attacker or malware,  root privs! 🔓👀
Adam Sawicki (@reg__) 's Twitter Profile Photo

"Hello World under the microscope" - an article we wrote together with Gynvael Coldwind and j00ru//vx! Originally published in issue 100 (1/2022) of the Programista magazine, now available online in Polish and English. asawicki.info/articles/Hello…

Andreas Stenhall (@andreasstenhall) 's Twitter Profile Photo

With more than two months to go of 2022 I can say with certainty that this is THE tip of the year: Shortcuts to Microsoft admin and user portals + deep shortcuts to Azure AD sections. aka.ms/commands

Corelight (@corelight_inc) 's Twitter Profile Photo

🧵We are excited to share that The Zeek Network Security Monitor is now a component of Microsoft Windows ! An incredible development that truly establishes Zeek as the de facto standard for #networkevidence: corelight.com/company/zeek-n… 1/4

ESET Research (@esetresearch) 's Twitter Profile Photo

#Emotet’s operators were busy updating their systeminfo module, with changes that enable malware operators to improve the targeting of specific victims and distinguish tracking bots from real users. #ESETresearch 1/7

Hamid Kashfi (@hkashfi) 's Twitter Profile Photo

Linux kernel WiFi stack bugs exploitable over the air are always worth following up with! CVE-2022-41674 (RCE) CVE-2022-42719 (RCE) <<< CVE-2022-42720 (RCE) CVE-2022-42721 (DoS) CVE-2022-42722 (DoS) openwall.com/lists/oss-secu…

Daniel Cuthbert (@dcuthbert) 's Twitter Profile Photo

A good writeup of the flaw here by Horizon3 Attack Team , which has left me shaking my head wondering how this code passed any inspection horizon3.ai/fortios-fortip…

Ryan (@haus3c) 's Twitter Profile Photo

Here's a finding I had in Defender earlier this year that I thought was neat. Not cool enough for a blog post, so here's a 🧵: Azure VMs have a component called 'Serial Console', which allows commands to be passed via COM1. The commands are limited, but one stood out: procdump

Germán Fernández (@1zrr4h) 's Twitter Profile Photo

3 subdominios de Microsoft (aka bypass) están siendo utilizados para distribuír #phishing dirigo al robo de credenciales corporativas 🤯 /ecv.microsoft.com/Wk7OBC6cRW /ncv.microsoft.com/fVgfvmUTpN /customervoice.microsoft.com También DigitalOcean y Skynet Labs ⚠️

3 subdominios de <a href="/Microsoft/">Microsoft</a> (aka bypass) están siendo utilizados para distribuír #phishing dirigo al robo de credenciales corporativas 🤯

/ecv.microsoft.com/Wk7OBC6cRW
/ncv.microsoft.com/fVgfvmUTpN
/customervoice.microsoft.com

También <a href="/digitalocean/">DigitalOcean</a> y <a href="/SkynetLabs/">Skynet Labs</a> ⚠️
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 (@_ethicalchaos_) 's Twitter Profile Photo

Sneak preview of Volumeiser. Final version will allow listing and extraction of OS files from common hard disk image formats. My favourite so far is AWS EBS snapshots. Extracting registry hives now takes seconds + a few MB of data instead of unworkable 100G images.

Sneak preview of Volumeiser.  Final version will allow listing and extraction of OS files from common hard disk image formats.  My favourite so far is AWS EBS snapshots.  Extracting registry hives now takes seconds + a few MB of data instead of unworkable 100G images.
Maxime De Greve (@maximedegreve) 's Twitter Profile Photo

Today, we're excited to launch GitHub code search - a new way to search and navigate code. We’re introducing a brand new search and code navigation view and they are jam packed with new features. Here are some I’m excited about.... 🧵 1/6

Today, we're excited to launch <a href="/github/">GitHub</a> code search - a new way to search and navigate code. 

We’re introducing a brand new search and code navigation view and they are jam packed with new features. Here are some I’m excited about.... 🧵 1/6
rebus (@therebus) 's Twitter Profile Photo

"Regipy MCP: Natural Language Registry Forensics with Claude" Six years ago, I wrote a blog post introducing regipy, a Python library I built because I was frustrated with existing registry forensic tools. I needed a tool that could parse registry hives… ift.tt/3oyxnkb