
plug
@plugxor
Followers
1K
Following
12K
Media
85
Statuses
2K
Your atypical security enthusiast | DFIR | Threat Hunting | Detection Eng | Insider Threat | Making content at The Blue Team Village | Opinions are my own.
Joined January 2013
There are individuals that you meet in your life that leave a mark, not just for their kindness & care, but for their humbleness & friendship. @d0ublebind is such individual and more! . Please consider donating and send him lots of love ❤️ . #FuckCancer.
1
0
2
RT @LitMoose: It doesn't matter if you know him or not, if you're seeing this, @d0ublebind has affected your life somehow. He got me throu….
0
27
0
If you are looking for very skillful, knowledgeable, and great human beings for your Red Team, please consider @Salbei_ and @Micheal_merrill . I worked with them for many years and with confidence can say that your team will greatly improve with them!.
Some of the people who are looking include @Salbei_ & @Micheal_merrill. I’m also happy to forward leads to the team.
0
0
2
Last year we used JuiceShop with a twist during our CTF. If you want to learn more about bug bounty and app security Juice Shop is a fun way to get started!.
Join the shared User Day of @owasp #DSOMM and #JuiceShop on Sep 25th, the day before @appsecusa San Francisco 2024! The agenda includes intros, demos, workshops and even a live CTF:. Register now on because seats are very limited!.
0
0
3
This, get familiar with your logs and how they can help you find this much more practical and likely scenario. Then, have a documented plan on how to respond and mitigate!.
For anyone worrying about this, I’d like to hear how you were already handling a near identical attack that didn’t require this vuln: . - steal Yubikey.- login.- returns key WITHOUT cloning it, because 1 session is enough for most objectives. Same attack flow. If that wasn’t.
0
1
4
Great use of the word likely in context of an investigation for which data may not be conclusive. When not fully sure, likely is a good word to choose. Their 2nd tweet tells the story, it was 2FA, the lack of it, plus “likely” an easy to guess password…. Kudos for the report!.
We have finished our investigation into last week's Mandiant X account takeover and determined it was likely a brute force password attack, limited to this single account.
1
0
5
What makes our CTF different?. You play the role of an IR consultant responding to a breach. You get access to host telemetry via a SIEM of your choice (graylog, elastic or splunk) . Net telemetry via Arkime or pcaps. Security Onion provides an easier path 4 the less experienced.
Call for Red Team Volunteers: . We are expanding hands-on content and working on a new CTF for @defcon 32. If you are an experienced Red Teamer, passionate about helping others, and would like to help, please reach out!. #redteam #cybersecurity.
1
2
6
We have ambitious goals. Our CTFs are based on real events and APTs. We need your help to accomplish our goals and have an immersive CTF for folks of all skill levels. Reach out if you have any questions! . Please apply asap!.
Call for Red Team Volunteers: . We are expanding hands-on content and working on a new CTF for @defcon 32. If you are an experienced Red Teamer, passionate about helping others, and would like to help, please reach out!. #redteam #cybersecurity.
0
0
1
RT @coolestcatiknow: @plugxor @1njection @CptOfEvilMinion @TilottamaSanyal @defcon @BlueTeamVillage I am so grateful to have worked on this….
0
3
0
Back in 2021 @coolestcatiknow @1njection @CptOfEvilMinion @TilottamaSanyal and I, presented a 2 day MacOS workshop @defcon @BlueTeamVillage on Emulating & Threat Hunting APT 32: OceanLotus. The workshop was kept private until today. You can play along: .
2
5
10
…It provides information that can be used to alter a TTP to evade an EDR completely. Please take a deep dive into the data @MITREengenuity is presenting. There is a HUGE distinction between conducting an actor emulation vs. simulation. 6/x.
1
0
2