mx (@n0pchain) 's Twitter Profile
mx

@n0pchain

the ghost in your shell

ID: 1355182316218417157

calendar_today29-01-2021 15:53:42

43 Tweet

40 Followers

48 Following

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

.CrowdStrike Intelligence discovered vulnerabilities affecting libvncclient; in some environments these can be triggered in a 1-click fashion. Learn more in the CrowdStrike blog “Scheming with URLs: One-Click Attack Surface in Linux Desktop Environments”: bit.ly/3D1YTY2

adam_cyber (@adam_cyber) 's Twitter Profile Photo

CrowdStrike has identified a malicious Java class file hosted on infra associated with a nation state adversary. The Java code is used to download known instances of adversary specific tooling and is likely to be used in conjunction with the recently disclosed #log4j issue.

mx (@n0pchain) 's Twitter Profile Photo

Hi @philipshuedev, what is the intention of rid compared to the id of a device using the API? /resource/room/{id} returns all rid's, but is it possible (without searching via /resource/light) to get the id of a device (like a lamp) to access it? Thank you.

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

(1/5) Do you have what it takes to go head-to-head with adversaries? CrowdStrike’s second annual #AdversaryQuest kicks off on July 11. Learn more: crwdstr.ke/6012zdlS6

Kasperle (@k4sperle) 's Twitter Profile Photo

ICYMI: My team at CrowdStrike will be hosting another #AdversaryQuest #ctf this year. The game will feature three adversary-themed tracks of four challenges each and will start on 11 July 2022. Registration is now open at adversary.quest.

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

Get ready to solve eCrimes with #AdversaryQuest from July 11-25! This virtual capture-the-flag game is open to players of all levels. Play for a chance to win CrowdStrike swag. Register: crwdstr.ke/6011zouWS

Get ready to solve eCrimes with #AdversaryQuest from July 11-25! 

This virtual capture-the-flag game is open to players of all levels. Play for a chance to win CrowdStrike swag.

Register: crwdstr.ke/6011zouWS
Kasperle (@k4sperle) 's Twitter Profile Photo

Our 2022 #AdversaryQuest is now live! The team did an awesome job creating 12 fun #ctf challenges by our vicious adversaries CATAPULT SPIDER, PROTECTIVE PENGUIN - and a new contestant: TABLOID JACKAL.

Our 2022 #AdversaryQuest is now live! The team did an awesome job creating 12 fun #ctf challenges by our vicious adversaries CATAPULT SPIDER, PROTECTIVE PENGUIN  - and a new contestant: TABLOID JACKAL.
CrowdStrike (@crowdstrike) 's Twitter Profile Photo

Are you smarter than an adversary? It's not too late to register for #AdversaryQuest! Starting today, you can battle other game participants for the coveted CrowdStrike swag. Register: crwdstr.ke/6015zS6uS

Are you smarter than an adversary? 

It's not too late to register for #AdversaryQuest! Starting today, you can battle other game participants for the coveted CrowdStrike swag. 

Register: crwdstr.ke/6015zS6uS
Kasperle (@k4sperle) 's Twitter Profile Photo

People were busy playing #adversaryquest #ctf over the weekend! Yun and jemoeder completed all 12 challenges and joined Sin__ at the top. Calle Svensson and evandrix picked up steam again and joined Patrick Walker in the next position with 10 solves, followed by Markus Dauberschmidt with 9.

People were busy playing #adversaryquest #ctf over the weekend! <a href="/YunZhengHu/">Yun</a> and jemoeder completed all 12 challenges and joined <a href="/mztropics/">Sin__</a> at the top. <a href="/ZetaTwo/">Calle Svensson</a> and <a href="/evandrix/">evandrix</a> picked up steam again and joined <a href="/HomeSen/">Patrick Walker</a> in the next position with 10 solves, followed by <a href="/daubsi/">Markus Dauberschmidt</a> with 9.
CrowdStrike (@crowdstrike) 's Twitter Profile Photo

CrowdStrike's annual #AdversaryQuest is in full swing! It's not too late to join the battle. Register: adversary.quest/register

CrowdStrike's annual #AdversaryQuest is in full swing!

It's not too late to join the battle. 

Register: adversary.quest/register
CrowdStrike (@crowdstrike) 's Twitter Profile Photo

Who are CATAPULT SPIDER and PROTECTIVE PENGUIN? Find out during CrowdStrike's #AdversaryQuest! It's not too late to register to compete in these unique solo challenges with a chance to win CrowdStrike swag. crwdstr.ke/6018zxYSe

Who are CATAPULT SPIDER and PROTECTIVE PENGUIN? 

Find out during CrowdStrike's #AdversaryQuest! It's not too late to register to compete in these unique solo challenges with a chance to win CrowdStrike swag.

crwdstr.ke/6018zxYSe
Kasperle (@k4sperle) 's Twitter Profile Photo

It's a wrap! The #adversaryquest has ended. Thank you everyone for playing and congratulations to our top 50 players! You will receive an email from us shortly!

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

Discover the 4 "capture the flag" challenges in our eCrime track of the Adversary Quest 2022: Very Phish, Such Control Wow, So Much Bits and Many Gode Much Chain. ⬇️ crwdstr.ke/6019zNQcx

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

Explore the four "capture the flag" challenges in our Hacktivism track of the Adversary Quest 2022: display0, Spellcheck, Password, tokens. crwdstr.ke/6012zAsh2

Explore the four "capture the flag" challenges in our Hacktivism track of the Adversary Quest 2022: display0, Spellcheck, Password, tokens. crwdstr.ke/6012zAsh2
CrowdStrike (@crowdstrike) 's Twitter Profile Photo

Explore the 4 "capture the flag" challenges in our Targeted Intrusion track of the Adversary Quest 2022: FrontDoor, Backup, Lights Out, Eyes Open. crwdstr.ke/6019MEbz1

Will (@bushidotoken) 's Twitter Profile Photo

The world of Ransomware is full of surprises: LockBit allegedly paid out their first “bug bounty” to someone who highlighted decryption flaws in the LB3 ESXi variant. The flaw made it possible to bypass having to pay the ransom for a key

The world of Ransomware is full of surprises: LockBit allegedly paid out their first “bug bounty” to someone who highlighted decryption flaws in the LB3 ESXi variant. The flaw made it possible to bypass having to pay the ransom for a key