
Jeff McJunkin
@jeffmcjunkin
Followers
12K
Following
78K
Media
1K
Statuses
13K
Started in ops&blue, now I hack for a living. SANS author/instructor in Oregon. Founder: https://t.co/c36tmCXDpt. He/him. @[email protected]
Southern Oregon
Joined April 2008
RT @TrustedSec: Chrome Remote Desktop can offer red teamers a subtle way to bypass restrictions—if they know how to use it. In this blog, @….
0
74
0
RT @Laughing_Mantis: Truly humbled to share I had the honor of being a guest on the legendary @DarknetDiaries. We talked about some wild st….
0
44
0
Anyone using Kubernetes at your company? You should strongly consider this class, if so. Jay does a fantastic job outlining the realistic risks and defenses, with lots of actionable take-away lessons.
Excited to teach #Kubernetes Attack & Defense @#BHUSA in Aug (@bhevents)! The class is >50% hands-on, w/ step-by-step labs. Students get computers to keep w/ CTF VMs & K8S cluster to #hack, win flags & break attacks. Come join me & the @InGuardians crew!
0
6
5
RT @RachelTobac: Now Scattered Spider is claiming they’re focusing on hacking aviation and transportation companies. Hawaiian Airlines and….
0
40
0
RT @dinodaizovi: This may highly indicative of where AI currently has the most utility: broadly scaling at the lower-end. It isn't going to….
0
16
0
RT @mubix: I have two super powers that have made me successful in my career. 1) I’m really good at asking for help.2) I also know how to….
0
20
0
RT @soolidsnakee: ClickFix is everywhere, checkout our newest research. #malware #ghostpulse #reverseengineer #clickfix.
0
7
0
RT @mcohmi: Been using this for a little while and this is what you requirements.txt conservatives should move to.
0
1
0
As today is Father's Day (not Fathers' Day), I propose all fathers have a tournament to find out whose day it *really* is. Note: If I'm drawing up the brackets, I'm putting @HackingDave on the opposite side of me 😂.
1
0
5
Smells like authenticated (as any user) RCE as SYSTEM. So not quite MS17-010 levels of bad (as that requires no authentication), but definitely "Domain User becomes Domain Admin in one step" levels of bad, if this is weaponized.
Windows SMB Client Elevation of Privilege Vulnerability. CVSS Score: 8.8. Attack Vector: Network.Attack Complexity: Low.Privileges Required: Low.User Interaction: None. Do I have to say more? .
10
38
201
RT @naumovax: Just look at my happy face :).So, my speech ended, thank you very much for coming and listening! I hope it was interesting 😇….
0
152
0
RT @badsectorlabs: MATCH (c1:Computer)-[:MemberOf*1. ]->(g:Group) WHERE g.objectsid ENDS WITH '-516' WITH COLLECT(c1[.]name) AS dcs MATCH (….
0
72
0
RT @Recon_InfoSec: Thursday is approaching! Join us tomorrow at 12:30 CT for #ThursdayDefensive to discuss using #AI to learn faster, with….
0
1
0
RT @_EthicalChaos_: A little while ago I tweeted about a potential BOF-PE design. So here it is, a new design that includes a fully linked….
0
59
0