Jared Atkinson(@jaredcatkinson) 's Twitter Profileg
Jared Atkinson

@jaredcatkinson

| Chief Strategist @specterops | Host @dcpthepodcast | Ex PowerShell MVP | USAF Vet | FC Bayern Supporter | Language Learner 🇳🇴 🇮🇹 🇧🇷 |

ID:1608740100

linkhttps://posts.specterops.io/on-detection/home calendar_today20-07-2013 18:13:53

6,6K Tweet

10,1K Takipçi

1,5K Takip Edilen

Jared Atkinson(@jaredcatkinson) 's Twitter Profile Photo

I've just released the 9th part of my On Detection series. In this post I demonstrate that we see actions in cyberspace at the Operational level and what that means for detection engineers.

posts.specterops.io/on-detection-t…

account_circle
Curt Wilson, human(@curtw) 's Twitter Profile Photo

Detection engineering is not new to me - I have done it for decades now, in various ways - but I find value in this writeup, especially the EDR-centric aspects. I’m looking forward to breaking new ground. Thanks Jared.

account_circle
Beau Bullock(@dafthack) 's Twitter Profile Photo

Today we are releasing GraphRunner, a post-exploitation toolset for M365 and Entra ID accounts that myself and rvrsh3ll have been building for the last few months.

Read the blog post here: blackhillsinfosec.com/introducing-gr…

Code is here: github.com/dafthack/Graph…

Today we are releasing GraphRunner, a post-exploitation toolset for M365 and Entra ID accounts that myself and @424f424f have been building for the last few months. Read the blog post here: blackhillsinfosec.com/introducing-gr… Code is here: github.com/dafthack/Graph…
account_circle
Jamie 🔜 ATT&CKcon 🎃🥳(@jamieantisocial) 's Twitter Profile Photo

'ask yourself whether you are building a detection for the “what” instead of the “how'

Put another way, are you detecting the tool and not the behavior?' 🧘

'ask yourself whether you are building a detection for the “what” instead of the “how' Put another way, are you detecting the tool and not the behavior?' 🧘
account_circle
Matt Hand(@matterpreter) 's Twitter Profile Photo

So surreal to finally have a copy in my hands. What a journey this has been. Thank you to everyone at No Starch Press who made this a reality.

So surreal to finally have a copy in my hands. What a journey this has been. Thank you to everyone at @nostarch who made this a reality.
account_circle
Nasreddine Bencherchali(@nas_bench) 's Twitter Profile Photo

A special today. Really wanted to highlight the amazing work being done by the teams SpecterOps 🇺🇦 Binary Defense TrustedSec Elastic Security Labs Splunk
They've been dropping some amazing and next level knowledge on us all year long. Just go follow everyone working there tbh and…

account_circle
SpecterOps 🇺🇦(@SpecterOps) 's Twitter Profile Photo

BloodHound & BloodHound Enterprise, albeit serving different purposes, are used to secure Active Directory based on the advanced science of graphs & trees. Irshad Ajmal Ahmed explains how these tools work without the complex jargon. ⬇️

account_circle
Jared Atkinson(@jaredcatkinson) 's Twitter Profile Photo

I've just released the 9th part of my On Detection series. In this post I demonstrate that we see actions in cyberspace at the Operational level and what that means for detection engineers.

posts.specterops.io/on-detection-t…

account_circle
Jared Atkinson(@jaredcatkinson) 's Twitter Profile Photo

I really enjoyed reading this post. Our job as defenders is to essentially predict not only our adversaries destination, but also which path they are most likely to take. One fundamental way to increase our ability to make accurate predictions is to eliminate potential paths…

account_circle
Olaf Hartong(@olafhartong) 's Twitter Profile Photo

It is out! FalconHound is now public.
github.com/FalconForceTea…

A blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion

Yesterday I spoke about FalconHound Wild West Hackin' Fest, slides to the talk:
github.com/olafhartong/Pr…

account_circle
Dr. Anton Chuvakin(@anton_chuvakin) 's Twitter Profile Photo

'Focus Threat Intel Capabilities at Detection Engineering (Part 4)' buff.ly/46GZDkg <- our series on detection engineering (DE) continue with Part 4 that looks at the intel flows from CTI/TI to DE.

'Focus Threat Intel Capabilities at Detection Engineering (Part 4)' buff.ly/46GZDkg <- our series on detection engineering (DE) continue with Part 4 that looks at the intel flows from CTI/TI to DE.
account_circle
Justin Ibarra(@br0k3ns0und) 's Twitter Profile Photo

I forgot I started this Jonny Johnson. Super easy to ingest jonmon into elastic.

I even started building an ingest pipeline for it as well, to make it more compatible with other endpoint sources.

I forgot I started this @jsecurity101. Super easy to ingest jonmon into elastic. I even started building an ingest pipeline for it as well, to make it more compatible with other endpoint sources.
account_circle
Jared Atkinson(@jaredcatkinson) 's Twitter Profile Photo

These are the types of blog posts that I find myself constantly revisiting. The interaction between LSA and RPC includes a lot of misdirection, but once it is understood the pattern becomes easy to follow. Thanks for sharing Kiwids!

account_circle
Olaf Hartong(@olafhartong) 's Twitter Profile Photo

Later this week, we FalconForce Official will release FalconHound at Wild West Hackin' Fest , a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. Co-developed with Walter.Legowski and Gijs H. Will post the link once its out!

Later this week, we @falconforceteam will release FalconHound at @WWHackinFest , a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. Co-developed with @SadProcessor and @gijs_h. Will post the link once its out!
account_circle
Jared Atkinson(@jaredcatkinson) 's Twitter Profile Photo

Yesterday I shared this thread on per-user services. You all responded with corroborative data from your environments, so I wanted write this thread highlighting your findings.
x.com/jaredcatkinson…

account_circle