Jeff McJunkin Profile
Jeff McJunkin

@jeffmcjunkin

Followers
12K
Following
78K
Media
1K
Statuses
13K

Started in ops&blue, now I hack for a living. SANS author/instructor in Oregon. Founder: https://t.co/c36tmCXDpt. He/him. @[email protected]

Southern Oregon
Joined April 2008
Don't wanna be here? Send us removal request.
@jeffmcjunkin
Jeff McJunkin
3 years
Imposter Syndrome is real, but you can take it multiple ways:.1) Out of any group, there is always something to learn.2) Out of any group, there is knowledge that only you have. Share it!. Be excellent to each other, always be learning, and always share!
Tweet media one
10
129
393
@jeffmcjunkin
Jeff McJunkin
2 days
RT @TrustedSec: Chrome Remote Desktop can offer red teamers a subtle way to bypass restrictions—if they know how to use it. In this blog, @….
0
74
0
@jeffmcjunkin
Jeff McJunkin
2 days
RT @Wietze: 🆕 Recent additions to . • shell32.dll,#44 for DLL execution.• PhotoViewer.dll for INetCache download.•….
0
91
0
@jeffmcjunkin
Jeff McJunkin
2 days
RT @Laughing_Mantis: Truly humbled to share I had the honor of being a guest on the legendary @DarknetDiaries. We talked about some wild st….
0
44
0
@jeffmcjunkin
Jeff McJunkin
3 days
Anyone using Kubernetes at your company? You should strongly consider this class, if so. Jay does a fantastic job outlining the realistic risks and defenses, with lots of actionable take-away lessons.
@jaybeale
Jay Beale
3 days
Excited to teach #Kubernetes Attack & Defense @#BHUSA in Aug (@bhevents)! The class is >50% hands-on, w/ step-by-step labs. Students get computers to keep w/ CTF VMs & K8S cluster to #hack, win flags & break attacks. Come join me & the @InGuardians crew!
0
6
5
@jeffmcjunkin
Jeff McJunkin
6 days
RT @harmj0y: Happy Friday! @tifkin_ and I are happy to announce that we have cut the release for Nemesis 2.0.0 - check out the CHANGELOG fo….
0
38
0
@jeffmcjunkin
Jeff McJunkin
7 days
RT @RachelTobac: Now Scattered Spider is claiming they’re focusing on hacking aviation and transportation companies. Hawaiian Airlines and….
0
40
0
@jeffmcjunkin
Jeff McJunkin
9 days
RT @dinodaizovi: This may highly indicative of where AI currently has the most utility: broadly scaling at the lower-end. It isn't going to….
0
16
0
@jeffmcjunkin
Jeff McJunkin
14 days
RT @mubix: I have two super powers that have made me successful in my career. 1) I’m really good at asking for help.2) I also know how to….
0
20
0
@jeffmcjunkin
Jeff McJunkin
17 days
RT @soolidsnakee: ClickFix is everywhere, checkout our newest research. #malware #ghostpulse #reverseengineer #clickfix.
0
7
0
@jeffmcjunkin
Jeff McJunkin
18 days
RT @mcohmi: Been using this for a little while and this is what you requirements.txt conservatives should move to.
0
1
0
@jeffmcjunkin
Jeff McJunkin
19 days
As today is Father's Day (not Fathers' Day), I propose all fathers have a tournament to find out whose day it *really* is. Note: If I'm drawing up the brackets, I'm putting @HackingDave on the opposite side of me 😂.
1
0
5
@jeffmcjunkin
Jeff McJunkin
24 days
Smells like authenticated (as any user) RCE as SYSTEM. So not quite MS17-010 levels of bad (as that requires no authentication), but definitely "Domain User becomes Domain Admin in one step" levels of bad, if this is weaponized.
@cyb3rops
Florian Roth ⚡️
24 days
Windows SMB Client Elevation of Privilege Vulnerability. CVSS Score: 8.8. Attack Vector: Network.Attack Complexity: Low.Privileges Required: Low.User Interaction: None. Do I have to say more? .
Tweet media one
10
38
201
@jeffmcjunkin
Jeff McJunkin
25 days
RT @brutecat: Leaking the phone number of any Google user.
0
173
0
@jeffmcjunkin
Jeff McJunkin
1 month
Groundhog Day is here again. Or perhaps it never left? 🤔.
@the_yellow_fall
Gray Hats
1 month
Critical 0-Day (CVSS 9.8) in Fortinet Products Actively Exploited. A critical Fortinet zero-day (CVE-2025-32756, CVSS 9.8) is being actively exploited, allowing unauthenticated RCE. PoC available, patch immediately.
1
0
4
@jeffmcjunkin
Jeff McJunkin
1 month
RT @naumovax: Just look at my happy face :).So, my speech ended, thank you very much for coming and listening! I hope it was interesting 😇….
0
152
0
@jeffmcjunkin
Jeff McJunkin
1 month
RT @badsectorlabs: MATCH (c1:Computer)-[:MemberOf*1. ]->(g:Group) WHERE g.objectsid ENDS WITH '-516' WITH COLLECT(c1[.]name) AS dcs MATCH (….
0
72
0
@jeffmcjunkin
Jeff McJunkin
1 month
Hot take: Creds in company-wide file shares is a bigger risk to most orgs than all internal CVEs combined.
4
2
29
@jeffmcjunkin
Jeff McJunkin
1 month
RT @Recon_InfoSec: @jeffmcjunkin If you're not registered yet, it's free. Join here:
0
1
0
@jeffmcjunkin
Jeff McJunkin
1 month
RT @Recon_InfoSec: Thursday is approaching! Join us tomorrow at 12:30 CT for #ThursdayDefensive to discuss using #AI to learn faster, with….
0
1
0
@jeffmcjunkin
Jeff McJunkin
1 month
RT @_EthicalChaos_: A little while ago I tweeted about a potential BOF-PE design. So here it is, a new design that includes a fully linked….
0
59
0