Christopher Peacock (@securepeacock) 's Twitter Profile
Christopher Peacock

@securepeacock

#PurpleTeam | Ex @RaytheonTech MSSP, @SCYTHE_IO, & @GD_OTS | Taught at BlackHat & DEFCON | #100DaysofSigma | Keep exploring, keep learning, and stay curious

ID: 1265689901485436931

linkhttps://github.com/securepeacock/presentations calendar_today27-05-2020 17:02:57

6,6K Tweet

6,6K Takipçi

1,1K Takip Edilen

Christopher Peacock (@securepeacock) 's Twitter Profile Photo

This is why I think TTP count is a terrible metric. You either detect the procedure adversaries use or you don’t, this count of 4 for whoami /all is meaningless in most cases.

This is why I think TTP count is a terrible metric. You either detect the procedure adversaries use or you don’t, this count of 4 for whoami /all is meaningless in most cases.
Christopher Peacock (@securepeacock) 's Twitter Profile Photo

I checked out the #ZeroDay series on Netflix and I think this depiction of events would take too many coordinated attacks. The Russian targeting of Ukraine with Blackenergy and Industroyer is more realistic to what happens. The scenes I saw more resemble an EMP attack.

Jorge Orchilles (@jorgeorchilles) 's Twitter Profile Photo

Formula 1 is back! If you played last year, you can rejoin without a passcode. If you would like to play, set up a team at fantasygp.com and DM me for the code to join #InfoSecF1

Formula 1 is back! If you played last year, you can rejoin without a passcode. If you would like to play, set up a team at fantasygp.com and DM me for the code to join #InfoSecF1
Christopher Peacock (@securepeacock) 's Twitter Profile Photo

Did some vendor actually try to develop their own CVE system for marketing and advertisement reasons, like ZDI-CAN-25373, instead of a standard CVE 🧐

Christopher Peacock (@securepeacock) 's Twitter Profile Photo

Is this a CVE? "ZDI...relates to the way Windows displays the contents of shortcut (.lnk) files through the Windows UI... an attacker can prepare a malicious .lnk file for delivery to a victim...the victim will not be able to tell that the file contains any malicious content."

Christopher Peacock (@securepeacock) 's Twitter Profile Photo

How to properly evaluate a CVE score: 1. Is Gossi freaking out? 2. Is Florian freaking out? 3. Does SANS have an emergency webcast? 4. Are all your red team friends losing their minds over how crazy easy it is to give them awesome access.

Christopher Peacock (@securepeacock) 's Twitter Profile Photo

If you want to reduce dwell time, which reduces the risk of impact, then don’t wait on risk and correlation alerts. Instead, tune your rules and start working low and informational alerts.

Christopher Peacock (@securepeacock) 's Twitter Profile Photo

This scene from John’s presentation was AMAZING. It hit on so many levels. I’ve never seen someone strike meaning and theatrical performance to this degree before. It was pure gold.