Lee Chagolla-Christensen(@tifkin_) 's Twitter Profileg
Lee Chagolla-Christensen

@tifkin_

I like making computers misbehave. Does stuff at https://t.co/YsrVyTjOY7.

Mastodon: @[email protected]

ID:239049595

linkhttps://github.com/leechristensen/ calendar_today16-01-2011 17:50:15

2,7K Tweets

13,0K Followers

812 Following

dreadnode(@dreadnode) 's Twitter Profile Photo

The first big update is live inside Crucible. New dashboard, never before seen challenges, progress tracking, walkthroughs…

Go check it out!

crucible.dreadnode.io

account_circle
Evan McBroom(@mcbroom_evan) 's Twitter Profile Photo

I just published a blog and tool for the LSA Whisperer work that was presented at the SpecterOps Conference (SOCON) back in March.

If you are interested in getting credentials from LSASS without accessing its memory, check it out!
medium.com/specter-ops-po…

account_circle
Jonas Bülow Knudsen(@Jonas_B_K) 's Twitter Profile Photo

If you want to get started with BloodHound CE, then I highly recommend reading this awesome blog post by Chris Haller. It's a great resource to kickstart your journey!
m4lwhere.medium.com/the-ultimate-g…

account_circle
Chris Thompson(@_Mayyhem) 's Twitter Profile Photo

I wrote a script to identify every TAKEOVER and ELEVATE attack in Misconfiguration Manager that can be run with Read-only Analyst privileges or higher in SCCM. Please share with your IT admins, defenders, clients, assessors, and friends in infosec!
posts.specterops.io/rooting-out-ri…

account_circle
Max Harley(@0xdab0) 's Twitter Profile Photo

THE KUBERNETES DOESN'T STOP
I'm learning the 'k3s' way of configuring kubernetes and created a Helm repo for Ghidra server. I learned a ton and if anyone finds it useful, you're free to use it:
github.com/t94j0/ghidra-k…

account_circle
Brian in Pittsburgh(@arekfurt) 's Twitter Profile Photo

Perhaps the single best thing that could happen to get MS to get its act together on improving Windows and AD security, maintainability, etc. without compelling customers to buy addons would be for DOJ to start investigating the above. And if news of that were somehow😯 to leak.

account_circle
Jim Sykora(@JimSycurity) 's Twitter Profile Photo

Lee Chagolla-Christensen Brian in Pittsburgh And unfortunately, without some sort of mandate I don't ever see Microsoft allocating the resources to put misconfiguration guardrails in place for any on-prem solutions.

account_circle
Lee Chagolla-Christensen(@tifkin_) 's Twitter Profile Photo

From my experience, the only way this changes is if $$$$$ paying customers demand it. Most are ignorant (including those big customers) or less funded, hence no demand.

account_circle
Brian in Pittsburgh(@arekfurt) 's Twitter Profile Photo

This is a thing that really galls me.
Microsoft could do things to help customers secure AD that don't require any breaking changes at ecosystem level.
For example, Windows Server could have integrated functionality or tools to help admins spot dangerous configuration issues.

account_circle
Chris Long(@Centurion) 's Twitter Profile Photo

I'm hiring a Staff Security Engineer focused on Detection & Incident Response. Qualified candidates have experience building detections & automations, understand adversary behavior, and can code.

100% remote, great benefits, US persons only.

jobs.ashbyhq.com/materialsecuri…

account_circle
lcamtuf (@lcamtuf@infosec.exchange)(@lcamtuf) 's Twitter Profile Photo

'The maintainers of libcolorpicker.so can’t be the only thing that stands between your critical infrastructure and Russian or Chinese intelligence services.'

lcamtuf.substack.com/p/oss-backdoor…

account_circle