Mike Felch (Stay Ready)(@ustayready) 's Twitter Profileg
Mike Felch (Stay Ready)

@ustayready

Pentester / Red Team | Hacking since Renegade BBS backdoors | Dev since vb3 | Content since '99-'03 ezines | Prior CrowdStrike / BHIS | In Christ's grip

ID:1573981532

linkhttps://darkoptics.com/ calendar_today07-07-2013 00:50:10

8,0K Tweets

14,6K Followers

2,2K Following

Follow People
Mike Felch (Stay Ready)(@ustayready) 's Twitter Profile Photo

Amazing Pistol 1 course with Warrior Poet Society and Warrior Poet Society.. looking forward to Pistol 2 and 3 tomorrow/Friday. Highly recommend this dude! Phenomenal instructor, great conversations, and teaches immediate results!

account_circle
Mike Felch (Stay Ready)(@ustayready) 's Twitter Profile Photo

Definitely will be my next training if it’s available again. In the mean time, here’s your chance. Fault injection is the new hotness.

account_circle
Dave Kennedy(@HackingDave) 's Twitter Profile Photo

Vulnerability in Putty:

'attacker in possession of a few dozen signed messages and the public key has enough information to recover the private key'

* Revoke keys immediately including public in authorized_keys
* Generate a new key pair and replace

chiark.greenend.org.uk/~sgtatham/putt…

account_circle
Mike Felch (Stay Ready)(@ustayready) 's Twitter Profile Photo

I love how AWS lets you create lots of FireProx API Gateways but when you go to clean things up, they rate limit you on the delete -- you get side tracked waiting -- and they never get removed.

account_circle
Mike Felch (Stay Ready)(@ustayready) 's Twitter Profile Photo

Ever wondered what hacking was like in the wild days of the 80s/90s/00s? Come take a journey back in time into the underground world of hackers/crackers. I'll unravel the stories/techniques/culture that defined this crazy era at HackSpaceCon tomorrow 4pm in End0r (9030)

account_circle
blasty(@bl4sty) 's Twitter Profile Photo

auth bypass confirmed!

> INFO:paramiko.transport:Authentication (password) successful!

mm_keyallowed_backdoor cmd 1 allows to override the response for mm_answer_authpassword with a custom one. if you set it to { u32(9), u8(13), u32(1), u32(0) } you can login with any pass 🤓

account_circle
Mike Felch (Stay Ready)(@ustayready) 's Twitter Profile Photo

XZ back door goes deep in the weeds. Backdoors have come along way since unrealircd and kernel.org / linuxfoundation targeting

account_circle
Keanu Nys(@RedByte1337) 's Twitter Profile Photo

🚀I'm finally releasing GraphSpy to the public!🕵️
A powerful offensive security tool focused on making initial access and post-compromise enumeration in Microsoft Entra and M365 much more convenient during penetration tests and red team assessments!

github.com/RedByte1337/Gr…

account_circle