SuRb0 Profile
SuRb0

@surbo

Followers
2K
Following
7K
Media
529
Statuses
4K

There is no such thing as Cheating in Hacking ( Tweets are just 1s & 0s that belong to me) - ♥️& RT ≠ endorsement

usa
Joined June 2008
Don't wanna be here? Send us removal request.
@surbo
SuRb0
6 years
Can we talk #Office365 for a sec? If a 3rd party is patching the software you're "renting" from them, are they obligated to tell you of a vulnerability that might have been used against your environment? https://t.co/fiRcPjLIdO ...
2
1
15
@surbo
SuRb0
29 days
It's the power socks that help you give an epic presentation. #Crowdstrike #Falcon
0
0
1
@surbo
SuRb0
2 months
It's been 19 years since the first electronic badge was released at DEF CON 14, and the last time the color of the badge was the only distinction between Human and Goon. Until now... #DEFCON PS-Don't do this!! "Goons keep y'all safe" #waitedforthelastday #thegoodoldhackerdays
1
9
43
@hevnsnt
~billswearingen☎️# 🟩
4 months
SECKC IS TODAY! We'll be taking over Knuckleheads Garage in KCMO for two amazing speakers! Schedule: 5:00–6:00 Make excuses / Pre-drinks, 6:00–6:10 Welcome + Announcements – @zuul (cont.)
1
5
7
@surbo
SuRb0
9 months
I love ground hog day!!!! LFG @Chiefs
0
0
1
@jaybeale
Jay Beale
9 months
So excited to be presenting at the last #ShmooCon with @antitree this morning @10am - "A Commencement into Real #Kubernetes Security!" https://t.co/etb43Dnvqa
1
10
19
@jotunvillur
LP
10 months
Don’t forget to leave a pcap and memory dump out for the SOC Analysts tonight.
1
26
131
@surbo
SuRb0
11 months
This seems to have some potential. Security Training topics include: cloud security, ethical hacking and surveillance, risk management, malware analysis, and more. #CyberSecurity @CISACyber https://t.co/ZAwsc3aqOi
niccs.cisa.gov
0
0
2
@surbo
SuRb0
1 year
See ya @SAINTCON!! Thanks for such an amazing event.
0
2
20
@surbo
SuRb0
1 year
I'm finally going to give the back story of the infamous zWarDial tool along with other security stories at @saintcon Tomorrow [Thursday @ 1:30 PM MDT] "The Bug Bounty Battlefield: A Choose Your Own Adventure Story on Why I Stopped Reporting Bugs" #saintcon 1/2
@sec_kc
SecKC
6 years
Hey folks--you might have seen a @BrianKrebs article on @zoom_us security that referenced #SecKC and @surbo this morning. You should know that we will NOT be releasing the #zWarDial to the public. If you see this tool offered, it is malware. https://t.co/FnqcFHlhF3
1
18
36
@HackingDave
Dave Kennedy
1 year
Great work and research from the @Binary_Defense team and @_Dwyer_
@Cyber_O51NT
Cyber_OSINT
1 year
Chinese state-sponsored spies infiltrated a global engineering firm's network via an IBM AIX server's default credentials. #CyberSecurity #ChineseEspionage https://t.co/GPm5FQuynX
7
8
59
@defconparties
Defcon Parties
1 year
We have a new party page https://t.co/fxWLGcwj59 that allows you to build your own party agenda by selecting the events you are interested in attending. Our party list is also built into the @defcon hacker tracker. #defcon32 #BHUSA
3
24
57
@surbo
SuRb0
1 year
Dropbox has reported a breach within the Sign product. Impacted Accounts have been logged out and reset but there are plenty of other actions you should be doing as well.
0
0
1
@surbo
SuRb0
2 years
Name Checks out...
1
0
9
@surbo
SuRb0
2 years
When you have to know and you don't want to install any tools. #redteam read -p "Enter IP address to scan: " target; for port in {22,80,443,135,137,138,139,3389,445,5900,5901}; do telnet $target $port > /dev/null 2>&1 && echo "$port open" || echo "$port closed"; done
0
0
2
@surbo
SuRb0
2 years
Merry Christmas y'all #0day
0
0
20
@todayininfosec
Today In Infosec
2 years
2011: The first DerbyCon security conference was held. The opening keynote was HD Moore's "Acoustic Intrusions". Founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw, the conference took place in Louisville annually through 2019. https://t.co/YseYspsusY
4
21
60
@nyxgeek
nyxgeek
2 years
Finally posted TeamsTracker code from my DC31 talk. https://t.co/PxHitMOB61 It proxies through Microsoft Graph Explorer to make unauthenticated Teams Presence/OOO lookups and logs them to a local db. Requires UUID of Azure account. Takes a CSV export from TeamFiltration, or a
Tweet card summary image
github.com
using graph proxy to monitor teams user presence. Contribute to nyxgeek/teamstracker development by creating an account on GitHub.
9
81
185
@surbo
SuRb0
2 years
Testing out my @dakacki top. #defcon @defconparties
1
2
24