Sparc Flow (@sparcflow) 's Twitter Profile
Sparc Flow

@sparcflow

H4cker, author of How to Hack Like a Pornstar amazon.com/dp/B01MTDLGQQ & How to Hack Like a Ghost amazon.com/dp/B08FH9SQNG
sparcflow.substack.com

ID: 827583494146621440

linkhttp://www.sparcflow.com calendar_today03-02-2017 18:24:15

377 Tweet

3,3K Followers

110 Following

Pete Markowsky (@petemarkowsky) 's Twitter Profile Photo

So finally feel like I can talk about this. Santa as in github.com/google/santa now supports file access authorization. This means that we can authorize if a binary should be able to open a file/path and leverage code signing for targeting/filtering.

Sparc Flow (@sparcflow) 's Twitter Profile Photo

"These are important issues, but, our roadmap is full for at least six months". Classic rebuttal to a vulnerability. The discussion then shifts into a Tetris-like game trying to fit imaginary deadlines. I detail how to avoid this trap in my book amazon.com/dp/B0C4LC4FDW

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🔖 So you think you can block Macros? Exploring the quirks of MS Office macro security * Abuse patterns * Bypasses for enterprise VBA macro settings * Legitimately signed Office docs * Securing an Office environment By Pieter Ceelen and Dima #blueteam outflank.nl/blog/2023/04/2…

🔖 So you think you can block Macros?

Exploring the quirks of MS Office macro security

* Abuse patterns
* Bypasses for enterprise VBA macro settings
* Legitimately signed Office docs
* Securing an Office environment

By <a href="/ptrpieter/">Pieter Ceelen</a> and <a href="/DaWouw/">Dima</a> #blueteam

outflank.nl/blog/2023/04/2…
Adam Chester 🏴‍☠️ (@_xpn_) 's Twitter Profile Photo

“Anyone can rant on a ticket. A precious few can create value. Strive to be the latter.” Brilliant book by Sparc Flow, reminds me of “The Phoenix Project”.

“Anyone can rant on a ticket. A precious few can create value. Strive to be the latter.” Brilliant book by <a href="/sparcFlow/">Sparc Flow</a>, reminds me of “The Phoenix Project”.
Sparc Flow (@sparcflow) 's Twitter Profile Photo

It's always funny to read CFPs claiming to solve Zero Trust architecture through...wait for it...network restrictions. Page 4 of the NIST paper:"Zero trust is the term [...] that move defenses from network-based perimeters to focus on users, assets, and resources"

Sparc Flow (@sparcflow) 's Twitter Profile Photo

While we're at it, Zero Trust architecture is not a good enough justification to remove that VPN or expose that app naked on the Internet... We want to stack those security layers, before potentially chopping some of them away, if the threat modelling makes sense

Will Schroeder (@harmj0y) 's Twitter Profile Photo

Lee Chagolla-Christensen , Max Harley , and I are very proud to announce that the alpha release of Nemesis is now public! The code is at github.com/SpecterOps/Nem… and we have a post explaining details at posts.specterops.io/hacking-with-y… 1/3

Sparc Flow (@sparcflow) 's Twitter Profile Photo

So let me get this right. When it comes to Cloud, companies have a choice between: a bad Console, unfixed 0-days, non-resilient DCs, and govt-owned DCs ? Oh my, what a tough choice!

Sparc Flow (@sparcflow) 's Twitter Profile Photo

mtls is overkill for 99% of use cases, Bearer toke auth works just as fine and is arguably better. Cert pinning in mobile apps does not make sense anymore in 2023…i mean i could go on…

Sparc Flow (@sparcflow) 's Twitter Profile Photo

Adding the X-Frame-Options = "DENY" won’t make a dent in your security landscape, but it sure as hell will spare you a ton of spam from wannabe bugbounty hunters.

Sparc Flow (@sparcflow) 's Twitter Profile Photo

How can any identity provider allow a session cookie A delivered to browser A and IP a.a.a.a, be used on browser B and IP b.b.b.b. I mean…come on.

No Starch Press (@nostarch) 's Twitter Profile Photo

Our Hacking Humble ebook Bundle Starts NOW! Pay what you want for up to 18 of our bestselling hacking and security titles—plus, your purchase benefits EFF and their fight against censorship. humblebundle.com/books/hacking-…

Our Hacking Humble ebook Bundle Starts NOW! Pay what you want for up to 18 of our bestselling hacking and security titles—plus, your purchase benefits <a href="/EFF/">EFF</a> and their fight against censorship. humblebundle.com/books/hacking-…
SpecterOps (@specterops) 's Twitter Profile Photo

#BHUSA is right around the corner! Join Jared Atkinson and Adam Chester 🏴‍☠️ for our Tradecraft Analysis course, and learn how attack techniques work under the hood and how to make the best use of available telemetry. Register today ▶️ ghst.ly/bhusa-atta

#BHUSA is right around the corner!  

Join <a href="/jaredcatkinson/">Jared Atkinson</a> and <a href="/_xpn_/">Adam Chester 🏴‍☠️</a> for our Tradecraft Analysis course, and learn how attack techniques work under the hood and how to make the best use of available telemetry.

Register today ▶️ ghst.ly/bhusa-atta