ACEResponder Profile Banner
ACE Responder Profile
ACE Responder

@ACEResponder

Followers
18K
Following
1K
Media
335
Statuses
783

Practice threat hunting & detection engineering in a real SIEM with real attacks. Join us and become the best.

Joined August 2022
Don't wanna be here? Send us removal request.
@ACEResponder
ACE Responder
5 days
How hackers capture hashes using file icons #ThreatHunting #DFIR
1
22
97
@ACEResponder
ACE Responder
7 days
C2 techniques used by hackers. #ThreatHunting #DFIR
0
17
79
@ACEResponder
ACE Responder
12 days
How SSH Proxying works #ThreatHunting #DFIR
1
22
156
@ACEResponder
ACE Responder
14 days
How Stuxnet worked #ThreatHunting #DFIR
3
17
92
@ACEResponder
ACE Responder
17 days
How NTLM authentication works #ThreatHunting #DFIR
0
38
202
@ACEResponder
ACE Responder
19 days
How the Impacket smbexec semi-interactive shell works. 🐚 #ThreatHunting #DFIR
0
18
115
@ACEResponder
ACE Responder
22 days
Windows RPC lateral movement quick reference for defenders. #ThreatHunting #DFIR
7
60
321
@ACEResponder
ACE Responder
24 days
⚡️NEW Analyst Module Learn to reverse engineer the malware from the recent Xubuntu hack. - Hands-on, real malware analysis in your browser - Anti-debugging & evasion techniques - Zero setup required - Beginner friendly Get started here👇 https://t.co/MRtxJp5TO9
0
6
34
@ACEResponder
ACE Responder
26 days
How DCOM lateral movement with Excel and ActivateMicrosoftApp works #ThreatHunting #DFIR
0
13
80
@ACEResponder
ACE Responder
28 days
How lateral movement with DLL hijacking works #ThreatHunting #DFIR
0
13
79
@ACEResponder
ACE Responder
1 month
How the bash reverse shell one-liner works #ThreatHunting #DFIR
0
15
148
@ACEResponder
ACE Responder
1 month
How the Active Directory Certificate Services ESC3 attack works. #ThreatHunting #DFIR
0
12
96
@ACEResponder
ACE Responder
1 month
🆓NEW FREE Module: Windows Portable Executable File Format https://t.co/1oe8gKVvK2 - Hands-on - Live analysis in your browser - zero setup Beginner-friendly introduction to analyzing malicious PEs #Malware #ReverseEngineering
1
21
118
@ACEResponder
ACE Responder
1 month
Windows security event IDs commonly used by defenders. #ThreatHunting #DFIR
0
36
203
@ACEResponder
ACE Responder
1 month
🔍Want to learn malware reverse engineering but don't know where to start? Check out our new blog. Covers the fundamentals, tools, and assembly basics. https://t.co/rYF750oSuQ
0
18
81
@ACEResponder
ACE Responder
1 month
How Active Directory Certificate Services ESC14 exploitation works #ThreatHunting #DFIR
0
29
221
@ACEResponder
ACE Responder
2 months
🆓New free reverse engineering challenge on https://t.co/syTSzIl91e! Analyze a Windows executable and recover the password. #Malware #ReverseEngineering
5
43
238
@ACEResponder
ACE Responder
2 months
⚡️NEW Module: Analyzing Obfuscated Shellcode - Hands-on - Live analysis in your browser - zero setup Beginner-friendly introduction to obfuscated shellcode extraction and analysis 👇 #ReverseEngineering #Malware https://t.co/9VdEBVbktl
0
42
195
@ACEResponder
ACE Responder
2 months
How scheduled tasks lateral movement works. #ThreatHunting #DFIR
0
23
100
@ACEResponder
ACE Responder
2 months
⚡️New free reverse engineering challenge! Crack a Windows executable right in your browser — no downloads, no VMs! Analyze the binary and recover the hidden password. Try it now on https://t.co/syTSzIlGQM! #Malware #ReverseEngineering
5
23
90