ACEResponder Profile Banner
ACE Responder Profile
ACE Responder

@ACEResponder

Followers
16K
Following
1K
Media
276
Statuses
708

Practice threat hunting & detection engineering in a real SIEM with real attacks. Join us and become the best.

Joined August 2022
Don't wanna be here? Send us removal request.
@ACEResponder
ACE Responder
6 months
🚀 Take your skills to the next level with our first professional certification: Certified Enterprise Defensive Analyst (CEDA)!. Perfect for junior to intermediate defenders looking to go beyond alerts. 💻. What you'll learn:. • Dive deep into Linux,.
3
12
55
@ACEResponder
ACE Responder
3 days
How DCOM lateral movement works. #ThreatHunting #DFIR
0
67
328
@ACEResponder
ACE Responder
6 days
How SMTP smuggling works ✉️. #ThreatHunting #DFIR
0
10
63
@ACEResponder
ACE Responder
8 days
📣The Pivot challenge is now available in or instant in-platform Kusto SIEM!. Uncover an intrusion with unique Command and Control techniques.
0
5
15
@ACEResponder
ACE Responder
10 days
How AI agents work. 🤖. #ThreatHunting #DFIR
0
18
93
@ACEResponder
ACE Responder
12 days
☁️ Pass-the-PRT: How attackers pivot to the cloud. #ThreatHunting #DFIR
3
49
274
@ACEResponder
ACE Responder
14 days
✅The Qakbot challenge is now available in the instant Kusto SIEM! . Take on one of world's most prolific cyber threats. #ThreatHunting #DFIR.
1
5
31
@ACEResponder
ACE Responder
15 days
Windows events that identify AD user object takeover. #ThreatHunting #DFIR
Tweet media one
0
48
266
@ACEResponder
ACE Responder
19 days
📢⚡️The Acquisition challenge is now available in the instant kusto SIEM!. An attacker takes advantage of a recent acquisition. Explore a breach spanning multiple AD forests and expose the attacker's persistence efforts. #ThreatHunting #DFIR.
0
3
16
@ACEResponder
ACE Responder
20 days
How password spraying works
2
16
86
@ACEResponder
ACE Responder
22 days
🆕Our Exchange Logons learning module is now live in our instant, in-platform SIEM! . Can you characterize authentication-based attacks against Exchange? Learn how in this beginner learning module.
0
4
21
@ACEResponder
ACE Responder
24 days
How SSH proxying works. #ThreatHunting #DFIR
1
25
140
@ACEResponder
ACE Responder
27 days
Windows Logon Types. #ThreatHunting #DFIR
Tweet media one
4
87
414
@ACEResponder
ACE Responder
28 days
✅New mini challenge on . Remote Service Lateral Movement . #ThreatHunting #DFIR
Tweet media one
0
4
17
@ACEResponder
ACE Responder
29 days
Threat hunting techniques: clustering. #ThreatHunting #DFIR
Tweet media one
0
30
154
@ACEResponder
ACE Responder
30 days
⚡️Our Run of the Mill challenge is now available in our new in-platform SIEM!. This challenge is free to everyone. #ThreatHunting #DFIR.
1
8
32
@ACEResponder
ACE Responder
1 month
Threat hunting techniques: Grouping . #ThreatHunting #DFIR
Tweet media one
1
43
180
@ACEResponder
ACE Responder
1 month
⚡️Our Phishing learning module is now available in our new in-platform SIEM!. Learn how to investigate common phishing attacks. #ThreatHunting #DFIR.
1
9
16
@ACEResponder
ACE Responder
1 month
How Azure device code phishing works. #ThreatHunting #DFIR
1
19
93
@ACEResponder
ACE Responder
1 month
✅New quick challenge on . WMI Lateral Movement. #ThreatHunting #DFIR
Tweet media one
0
7
41
@ACEResponder
ACE Responder
1 month
Threat Hunting Techniques: Aggregation📊 #ThreatHunting #DFIR
Tweet media one
1
21
122