0rig3n Profile Banner
Orig3n Profile
Orig3n

@0rig3n

Followers
87
Following
400
Media
13
Statuses
150

Incident Response and Threat hunting

Joined June 2010
Don't wanna be here? Send us removal request.
@HackNwa
HackNWA
11 months
It's that time of year. We are pleased to bring you HackNWA Conference 2025: Sock Puppet Tycoon - Disposable Machine, Network, Server, Client and Identity;Make frens and influence ppl Great speakers, activities, panelists, and afterparty concert in Bentonville Get your tickets!
0
7
12
@0rig3n
Orig3n
2 years
👏 Congratulations. I know being on the Blue side can be stressful! Had a fun time thinking Red team thoughts :)
@SWCCDC
Southwest CCDC
2 years
Congratulations to the following teams for qualifying for the 2024 SWCCDC regional event: @Baylor @LATech @PhilanderSmith @SamHoustonState @SAC_PR @TAMU @UTAustin @utulsa We look forward to seeing everyone in March!
0
0
0
@0rig3n
Orig3n
3 years
Woot! @OrOneEqualsOne speaking at @Sp4rkCon !!
0
1
12
@0rig3n
Orig3n
3 years
Great talk by @kaoticfen at @Sp4rkCon !!!!
0
1
7
@mcohmi
Ohm-I (Oh My)
3 years
Gonna be in Bentonville on April 15th attending #Sp4rkCon and then performing at a separate party later. About to take over this whole midwest con party scene 😤
@HackNwa
HackNWA
3 years
Looking for a day packed with infosec events on Apr 15th you should check out #Sp4rkCon and @HackNWA in Bentonville. All events are free and open to the public! https://t.co/N9u55dkk4z
2
5
12
@OrOneEqualsOne
Carrie Roberts
3 years
I'm teaching my PowerShell For InfoSec course live online for the first time on 3/2/23 and 3/3/23. It is a 2 day class for $575 from @Antisy_Training. Have you already taken the On-Demand (pre-recorded) version? What did you think? Check it out here:
Tweet card summary image
antisyphontraining.com
This course covers PowerShell fundamentals, execution logging options, and security features for both offensive and defensive applications in IT environments.
0
14
30
@Antisy_Training
Antisyphon Training
3 years
The next run of PowerShell for InfoSec:What You Need to Know! w/ @OrOneEqualsOne, that be during our summit, we're honored to be supporting @cybher_dsu w/ 10% of our revenue from this class! Class registration: https://t.co/dkMO4Dt8ku Support this project:
cybher.org
CybHER® : Empowering, Motivating and Educating Girls in CyberSecurity - To date, we have reached over 9000 girls with our collective efforts.
0
4
5
@0rig3n
Orig3n
3 years
Just learned about this cool lots-project by @mrd0x. Here is a MDE KQL #threathunting query that looks for lolbins talking to lots-project domains.
Tweet card summary image
gist.github.com
Threat hunting search, lolbins talking to lots domains. - lolbin-lots.txt
0
0
0
@0rig3n
Orig3n
3 years
Thinking of different ways of #threathunting lolbins, especially ones that don’t normally communicate over the network. This is a good base query to get started in Microsoft Defender for Endpoint. #kql
Tweet card summary image
gist.github.com
Search Microsoft Defender console for lolbins making network connections. - Lolbins.md
0
0
0
@MsftSecIntel
Microsoft Threat Intelligence
3 years
Microsoft has been tracking Iranian actor PHOSPHORUS’ ransomware sub-group known as DEV-0270, aka Nemesis Kitten. The group is responsible for multiple attacks typically using high-severity vulnerabilities to gain access. TTPs and more in our latest blog: https://t.co/DEi64NWRJE
2
125
212
@0rig3n
Orig3n
3 years
Microsoft MDE kql queries based on IP/Hashes from [redacted]'s report on Bian Lian https://t.co/57bOpHqzko #ThreatIntel
Tweet card summary image
gist.github.com
Bian Lian KQL search. GitHub Gist: instantly share code, notes, and snippets.
0
2
1
@OrOneEqualsOne
Carrie Roberts
3 years
When I switched from offensive security (Red Team) to defensive security (Blue Team) I promised to share my thoughts about my experience and here they are - finally. 😀
Tweet card summary image
medium.com
I was a web application developer in 2010 when I learned about pentesting. I fell in love with the idea that I could get paid to break…
5
66
337
@InonShkedy
Inon Shkedy
4 years
~Free STUFF~ We still have 10 unclaimed copies of "Hacking API" book. So if you want to win one of those, simply Like & RT. This month we give away 50 books, 5 Burp & 5 Pentester Academy licenses. Follow @traceableai and @InonShkedy for more giveaways 🥳🥳
42
501
674
@0rig3n
Orig3n
4 years
Really highlights the importance of enabling Diagnostic logs for KeyVaults.
@inversecos
inversecos
4 years
1\ 👿How to detect and compromise Azure Key Vaults🔐 Attackers target Azure vaults to pillage JUICY 🥵 data for data collection & lateral movement as they contain: - API keys - passwords - certificates 👇Check out my blog for the attack & detection👇 https://t.co/Vv1c7xTWQg
0
0
0
@inversecos
inversecos
4 years
1\ How to detect file timestomping 👀 APT28, APT29, APT32, APT38 have all used this defence evasion technique to modify malicious file creation times. 😈 Did you also know it's possible to timestomp $FN time? 👇👇 BLOG & TL;DR BELOW 👇👇 https://t.co/B2oUtA5owF
12
268
729
@MattCalligan
Matt Calligan
4 years
@briankrebs Stop. Putting. Critical. Comms. On. Your. Network. You know its bad when even Microsoft is telling you to not use Microsoft.
0
3
25
@0rig3n
Orig3n
4 years
Azure #threathunting query. Find who in your environment is performing password resets on VMs. This catches ssh key, ssh password and windows password resets.
gist.github.com
Azure VM password reset query. GitHub Gist: instantly share code, notes, and snippets.
0
1
0
@0rig3n
Orig3n
4 years
When Cloud threat hunting I like to keep an eye on who is trying to deploy new resources where the action is denied. Nested groups are the enemy of a well implemented RBAC solution. Azure query here ->
Tweet card summary image
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
0
0
0
@0rig3n
Orig3n
4 years
Azure hunt query, looking for new resources they being deployed but was denied. Not a common as you might think. Got any cloud hunting queries to share?
0
0
0
@0rig3n
Orig3n
4 years
AzureActivity| where TimeGenerated > ago(1d) | where ActivitySubstatusValue == 'BadRequest' | where OperationNameValue == 'MICROSOFT.RESOURCES/DEPLOYMENTS/VALIDATE/ACTION' | extend resource_ = tostring(parse_json(Properties).resource) #ThreatHunting
1
0
0