fullmetalcache Profile Banner
brian fehrman Profile
brian fehrman

@fullmetalcache

Followers
876
Following
71
Media
10
Statuses
141

Pentester, researcher, developer, hunter, cat video enthusiast

Rapid City, SD
Joined March 2015
Don't wanna be here? Send us removal request.
@JohnLaTwC
John Lambert
4 years
#HuntingTipOfTheDay InstallUtil is a popular living-off-the-land binary for running payloads (šŸ™ @subtee). Have a hunt for unusual parent processes and low prevalence /u param locations. šŸ“Ž https://t.co/YqlWKXqK7N šŸ‘‰ https://t.co/6QBan4Admh šŸ™ by @fullmetalcache (@BHinfoSecurity)
0
40
97
@dafthack
Beau Bullock
5 years
There are still some seats open for this training. Come join me in a couple weeks for some cloud hacking. This is a fully remote 4 day (16 hours total) class for $395. Also, each day is recorded so you can view it at your leisure.
@dafthack
Beau Bullock
5 years
I'm stoked to be teaching my Breaching the Cloud course again November 2-5 as part of Secure West Virginia. A training ticket also gets you access to the rest of the Secure WV conference. June & August classes sold out quickly so sign up soon here: https://t.co/aZJKm1Y08D
5
11
31
@nostarch
No Starch Press
6 years
The Ghidra Book is now available in Early Access! Get eight chapters now when you pre-order from https://t.co/kWVSHRa0gB. Sign up for our newsletter to get a special discount on this and future pre-orders! https://t.co/m8v1d578vC
9
132
372
Happy to introduce everyone to our Initial Access Operations course! We’re looking at different ways bad guys try to break into networks and the phishing malware they develop. It’s a hands on class, be ready to code! Come join us at @BSidesCHS!
@hexlax
Paul Burbage
6 years
Tickets on sale now for @FortyNorthSec’s course ā€œInitial Access Operationsā€. Learn the techniques used by attackers to phish companies and write your own malware. A portion of the proceeds benefit @BSidesCHS, a 501c3 nonprofit. https://t.co/5rfTGvWSjG
0
5
19
@fullmetalcache
brian fehrman
6 years
Increase your chances of a successful C2 channel by relaying your traffic through CloudFront. No need for a categorized domain, some companies whitelist it, looks like CDN traffic, and hides the origin of your C2 server! @BHinfoSecurity
Tweet card summary image
blackhillsinfosec.com
Brian Fehrman // Many of you have likely heard of Domain Fronting. Domain Fronting is a technique that can allow your C2 traffic to blend in with a target’s traffic […]
1
66
159
@MalwareJake
Jake Williams
7 years
Notice to vendors: Next week if your sales dweebs tell me you use deep learning, AI, or machine learning at #RSAC but won't explain how, I'm live tweeting all the fail with hashtag #VendorWordVomit. Naming and shaming. You've been warned.
60
98
634
@fullmetalcache
brian fehrman
7 years
Fixed an issue with the Password Filter deployment in CredDefense so it /should/ be good now if you run CredDefense.exe that's in the "Builds" folder. Next up is cleaning up the whole build process. https://t.co/GUv1BaYh1G. @BHinfoSecurity
Tweet card summary image
github.com
Credential and Red Teaming Defense for Windows Environments - CredDefense/CredDefense
0
0
0
@fullmetalcache
brian fehrman
7 years
Added quick fix so that PowerLine can now be built on Win10 w/o .NET 2.0/3.5. Now it /should/ build on any Win7 or Win10 system. https://t.co/x1y6TYoMr2 @BHinfoSecurity
github.com
Contribute to fullmetalcache/PowerLine development by creating an account on GitHub.
0
10
15
@strandjs
strandjs - [email protected]
7 years
Our next webcast will be covering many of the lesser known, but amazing, tools we use all the time at BHIS. Yea, they are all free tools. Because freedom is awesome. December 11th, 1ET. https://t.co/LhFufRV5Zk
4
28
68
@fullmetalcache
brian fehrman
8 years
If you aren't looking for Lync servers, you should be! All of the benefits of attacking OWA portals (user enum, password spray, domain info,etc.). There's a good chance one is present and an even better chance that it's been forgotten. Check out this post: https://t.co/gjWUKLkn2V
1
27
46
@BHinfoSecurity
Black Hills Information Security
8 years
Straight from the office of @fullmetalcache we have "PowerShell w/o PowerShell Simplified" on the #BHISblog today: https://t.co/j3x2BN2vxR
0
33
58
@fullmetalcache
brian fehrman
8 years
Finally pushed a change for CredDefense. It should hopefully fix the issue where DCs wouldn't show up in the Password Filter module but would show in the Password Audit module. @BHinfoSecurity #creddefense
github.com
…hould hopefully fix the issue with the DCs not being listed. It is, admittedly, a band-aid for now =)
0
5
9
@joegrand
Joe Grand
8 years
An entire book on PCB reverse engineering! Includes work by @joegrand, @johndmcmaster, and Sergei Skorobogatov among others :) https://t.co/mSgOWuGAtC
1
107
254
@fullmetalcache
brian fehrman
8 years
Verifying myself: I am fullmetalcache on Keybase.io. tnCkS7s-SwGliVv3mh7Sar3tF8Vu6BLNjMx4 /
0
0
1
@RachelTobac
Rachel Tobac
8 years
Anyone understand how push to start car key spoofing works? Surprised I didn’t see it demonstrated at @defcon šŸ¤–šŸ§
24
81
141
@fullmetalcache
brian fehrman
8 years
ordered edible arrangement for wife. scammers called store and scammed order info. scammers then used order info to call me to try for cc info. nice try...
1
0
2
@yellowfattale
Pete Petersen
8 years
Thanks to @0xderuke , @dafthack and @fullmetalcache and @BHinfoSecurity for Cred Defense toolkit. Works great with big cracked lists.
0
5
12
@EanMeyer
Ean Meyer - @eanmeyer.bsky.social
8 years
Brian & Rick did an amazing job on the hardware hacking labs @WWHackinFest I dumped firmware and found hard coded passwords! #WWHackinFest
0
1
1
@digininja
Robin
8 years
Extra thanks to @fullmetalcache and @strandjs and family for the extras that really made the trip special
1
2
6