CNBY Security (@clownbaby_oi) 's Twitter Profile
CNBY Security

@clownbaby_oi

cybersecurity

ID: 1499396156635418626

calendar_today03-03-2022 14:48:25

501 Tweet

35 Takipçi

367 Takip Edilen

0b1d1 (@_0b1d1) 's Twitter Profile Photo

🕵️ Windows Forensics: Investigating Microsoft Systems 🧠🪟 From SOC analysts to blue teamers, mastering Windows forensics is key to detecting compromise, tracing attacker actions, and securing endpoints.

🕵️ Windows Forensics: Investigating Microsoft Systems 🧠🪟

From SOC analysts to blue teamers, mastering Windows forensics is key to detecting compromise, tracing attacker actions, and securing endpoints.
payloadartist (@payloadartist) 's Twitter Profile Photo

Apparently, there is a new kind of marketplace for red teamers and pentesters to sell advanced techniques, exploits, payloads, etc. ttp.exchange Is there a market for this? I reckon such sellers would already have known trusted channels to go through.

Apparently, there is a new kind of marketplace for red teamers and pentesters to sell advanced techniques, exploits, payloads, etc.

ttp.exchange

Is there a market for this? I reckon such sellers would already have known trusted channels to go through.
0b1d1 (@_0b1d1) 's Twitter Profile Photo

How CamXploit Works CamXploit is a Camera Exploitation & Exposure Scanner designed for security researchers and ethical hackers. It helps detect open or vulnerable CCTV/IP cameras on the internet or local networks.

How CamXploit Works

CamXploit is a Camera Exploitation & Exposure Scanner designed for security researchers and ethical hackers. It helps detect open or vulnerable CCTV/IP cameras on the internet or local networks.
Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Evil-noVNC: A Realistic Phishing Simulation hackingarticles.in/evil-novnc-a-r… 🔥 Telegram: t.me/hackinarticles #CyberSecurity #InfoSec #CyberAwareness #CyberThreats #DataSecurity #informationsecurity #ITSecurity #CyberSecurityTraining #EthicalHacking #BlueTeam #RedTeam #CTF

Evil-noVNC: A Realistic Phishing Simulation

hackingarticles.in/evil-novnc-a-r…

🔥 Telegram: t.me/hackinarticles

#CyberSecurity #InfoSec #CyberAwareness #CyberThreats #DataSecurity #informationsecurity #ITSecurity #CyberSecurityTraining #EthicalHacking #BlueTeam #RedTeam #CTF
0b1d1 (@_0b1d1) 's Twitter Profile Photo

🔍 Abusing 404 Pages for Endpoint Discovery (The Hidden Recon Technique No One Talks About) Most hackers move on when they hit a 404 page. It just says “Not Found,” right? But here’s the twist sometimes those 404 pages leak information about real endpoints.

🔍 Abusing 404 Pages for Endpoint Discovery
(The Hidden Recon Technique No One Talks About)

Most hackers move on when they hit a 404 page. It just says “Not Found,” right? But here’s the twist sometimes those 404 pages leak information about real endpoints.
vx-underground (@vxunderground) 's Twitter Profile Photo

Nerds angry at Proton Mail today (yesterday?) due to internet drama (as is tradition). People are big mad. Is it a big deal? Are people overreacting? Why did normie accounts comment on the issue like they know what's going on? Phrack Zine did some silly things on the internet. They

Nerds angry at <a href="/ProtonMail/">Proton Mail</a> today (yesterday?) due to internet drama (as is tradition). People are big mad. Is it a big deal? Are people overreacting? Why did normie accounts comment on the issue like they know what's going on?

<a href="/phrack/">Phrack Zine</a> did some silly things on the internet. They
HackerRats - Uncle Rat ❤️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

Top 10 web area's to start your hunt with: 1. SQL Injection (#SQLi) 2. Cross-Site Scripting (#XSS) 3. Cross-Site Request Forgery (#CSRF) 4. Insecure Direct Object References (#IDOR) 5. Clickjacking (#Clickjacking) 6. Command Injection (#CommandInjection) 7. Remote File

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Defending OT with Attack Reference Architecture 🔥 Telegram: t.me/hackinarticles #CyberSecurity #InfoSec #PenetrationTesting #EthicalHacking #BugBounty #ThreatIntelligence #RedTeam #BlueTeam #CloudSecurity #DataSecurity #ZeroTrust #CyberSecurityJobs #CyberSecurityAwareness

Defending OT with Attack Reference Architecture

🔥 Telegram: t.me/hackinarticles

#CyberSecurity #InfoSec #PenetrationTesting #EthicalHacking #BugBounty #ThreatIntelligence #RedTeam #BlueTeam #CloudSecurity #DataSecurity #ZeroTrust #CyberSecurityJobs #CyberSecurityAwareness
mRr3b00t (@uk_daniel_card) 's Twitter Profile Photo

The Cyber Industry is like this: I want you to be a team member but also: Security Architect Security Engineer Detection Engineer Incident Responder Penetester Malware Dev BCP Archtict SOC Anlayst SOC Manager Lockpick Expert Close Access Expert Sales Person Marketing Expert

Rudy Ooms | MVP 🇳🇱 (@mister_mdm) 's Twitter Profile Photo

Administrator Protection in Windows 25H2 Changes Everything With update KB5067036, Windows quietly introduced Administrator Protection, and it changes how Windows handles admin rights. Until now, being a local admin meant living like Clark Kent: doing normal tasks in plain

Administrator Protection in Windows 25H2 Changes Everything

With update KB5067036, Windows quietly introduced Administrator Protection, and it changes how Windows handles admin rights.

Until now, being a local admin meant living like Clark Kent: doing normal tasks in plain
0b1d1 (@_0b1d1) 's Twitter Profile Photo

🚩 Master the Art of CTFs: The Ultimate Cybersecurity Cheatsheet 💻⚡ Capture The Flag (CTF) challenges are one of the fastest ways to build real, hands-on hacking skills and this cheatsheet is designed to take you from beginner to expert

🚩 Master the Art of CTFs: The Ultimate Cybersecurity Cheatsheet 💻⚡
Capture The Flag (CTF) challenges are one of the fastest ways to build real, hands-on hacking skills  and this cheatsheet is designed to take you from beginner to expert
Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🍯 If you've never seen or worked with a Honeypot, watch this video. It covers how to setup almost 20+ honeypots (and visualize the data) to trap attackers. Video: youtube.com/watch?v=FjZmhI…

🍯 If you've never seen or worked with a Honeypot, watch this video.

It covers how to setup almost 20+ honeypots (and visualize the data) to trap attackers.

Video: youtube.com/watch?v=FjZmhI…
Kaido Järvemets (@kaidja) 's Twitter Profile Photo

Incident response in 2030: Ransomware hits. Every account locked. SIEM screaming. SOAR crying. CISO glowing red in Teams. The incident responder walks in. Cold coffee. Opens: "Microsoft Sentinel Copilot Ultra Premium for Incidents – Public Preview v37" Types the golden

Incident response in 2030:

Ransomware hits.

Every account locked.
SIEM screaming.
SOAR crying.
CISO glowing red in Teams.

The incident responder walks in. Cold coffee. Opens:

"Microsoft Sentinel Copilot Ultra Premium for Incidents – Public Preview v37"

Types the golden
Rudy Ooms | MVP 🇳🇱 (@mister_mdm) 's Twitter Profile Photo

Ever wondered why a device syncs differently with Intune? And why hammering the "Sync button" in Work or school only brings down your policies, while Win32 apps do nothing? This diagram shows why. Policies flow through OMA-DM. (Intune / MMP-C) Win32 apps and PowerShell run

Ever wondered why a device syncs differently with Intune?

And why hammering the "Sync button" in Work or school only brings down your policies, while Win32 apps do nothing?

This diagram shows why.

Policies flow through OMA-DM. (Intune / MMP-C)
Win32 apps and PowerShell run
Hussein Nasser (@hnasr) 's Twitter Profile Photo

Routing is one of the most critical concepts in networking, yet it is challenging to understand. In this post, I break down the concept of routing from the very basics to the most advanced routing tables that power the Internet. I also give an example of manipulating network

Routing is one of the most critical concepts in networking, yet it is challenging to understand. In this post, I break down the concept of routing from the very basics to the most advanced routing tables that power the Internet. I also give an example of manipulating network