xenosCR Profile Banner
Conor Richard Profile
Conor Richard

@xenosCR

Followers
1K
Following
13K
Media
192
Statuses
3K

Cyber, OSCE, OSWE, OSCP Certified, Knowledge Seeker, and my opinions are my own.

Joined January 2015
Don't wanna be here? Send us removal request.
@xenosCR
Conor Richard
4 years
I did a bit of research and learning and have blogged about it an released some code. I wanted to understand Nirvana Hooks, specifically in x86. So I did a thing: https://t.co/EaygKMJmmb https://t.co/8eNYoiJ8Tg
Tweet card summary image
github.com
A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks. - xenoscr/manual-syscall-detect
0
57
120
@Oddvarmoe
Oddvar Moe
3 years
Well well! Microsoft removed the Windows version checks to use AppLocker! Everyone can now use AppLocker! https://t.co/s0gqOJys9M
3
54
163
@anton_chuvakin
Dr. Anton Chuvakin
3 years
I love detection engineering, I think it is awesome and hugely needed, and its the future and all that. But I have no idea how to talk about it to a team of 1 (ONE) running a SIEM ...
30
13
242
@paradoxengine
Claudio Criscione
3 years
Repeat after me: vulnerability management is not incident response. We see an RCE a week, why do we randomly select a few to be OMGTHISBAD and scramble? All those other RCEs being discriminated are sad... and still popping you.
5
4
24
@LitMoose
Moose
3 years
Show me a person who blames the EDR, and 9.9 times out of 10 I'll show you someone who doesn't understand: DNS FW rules Noisy Dev jobs GPO Gapping Bad config Scanners You need something on your endpoints that auto-blocks crud, but you still have to fix your internal problems.
13
26
234
@xenosCR
Conor Richard
3 years
Technically unemployed for a few days. New adventures await starting Monday!
0
0
3
@jsnover
Jeffrey Snover
3 years
Priorities are not what you say, they are what you fund. Culture is not what you say, it's what you reward. Action is a lie detector.
8
50
282
@DuneQuoteBot
Dune Quotes
3 years
Once men turned their thinking over to machines in the hope that this would set them free. But that only permitted other men with machines to enslave them.
4
187
554
@med0x2e
Mohamed El Azaar
3 years
@HackingLZ Some immature companies (ex; no SIEM or whatever) tend to go for RTs before PTs for leverage. mainly to get management to take a seat in the same room, listen, and take security more seriously ($$$).
0
1
2
@bohops
bohops
3 years
I guess the general points are: - We need more people to contribute to the profession - We need to encourage people to share (coaching and validation are acceptable) - The community that shares defensive content is smaller IMO. It would be great to see others in this space
0
2
13
@bohops
bohops
3 years
The leap that it takes to publicly share infosec knowledge/content is generally underappreciated. Often, folks who want to share with the community do not out of anxiety/fear of acceptance/etc. And then, there is the asymmetry of those who share offensive content vs defensive.
@nas_bench
Nasreddine Bencherchali
3 years
I love how when someone shares an offensive tool he gets praised. But when a blue teamer shares a detection he's told that it's bypassable/weak. 🤫
1
2
18
@bohops
bohops
3 years
Be a perpetual student. Expertise is a snapshot in time that eventually fades away.
0
13
32
@bohops
bohops
3 years
#LOLBAS hit 5000 stars on GitHub to bring in the New Year! Thank you all for the support over the years - it truly is a community project! Big shout out to @Oddvarmoe🙏, @xenosCR, @ConsciousHacker, @liamsomerville, @Wietze, and @_josehelps for all the hard work to keep it going!
2
14
76
@xenosCR
Conor Richard
3 years
This is bad. What about accounts of the deceased? Things that should remain part of the public record?
@elonmusk
Elon Musk
3 years
Twitter will soon start freeing the name space of 1.5 billion accounts
0
0
0
@PortSwiggerRes
PortSwigger Research
3 years
Stealing passwords from infosec Mastodon - without bypassing CSP https://t.co/kXIqj3tpAU
19
638
2K
@Intel471Inc
Intel 471
3 years
Intel 471 is deeply saddened by the tragic news of Vitali Kremez's untimely passing. We extend our deepest condolences to his family, friends and his Advance Intelligence Team during this challenging time.
0
12
77
@xenosCR
Conor Richard
3 years
Not saying I'm moving but just in case, I joined mastodon as: https://ioc[.]exchange/web/@xenoscr Anyone that I follow here or who follows me, I'd be happy to connect.
0
0
0
@HackingDave
Dave Kennedy
3 years
Good life lesson: Hurt people, hurt people. Took me awhile to not worry or care about the people that aren’t happy for others successes or for others positivity to help people or make a positive difference in others lives. They are the unhappy ones. I hope they find happiness.
Tweet media one
18
30
243
@notwhickey
¬ whickey
3 years
POC: mkdir %temp%\System32 FOR /R C:\Windows\System32\ %F IN (*.dll) DO COPY "%F" %temp%\System32\ /Y >NUL set a=C:\Windows\System32\calc.exe copy %a% %temp%\System32\rstrui.exe /Y > NUL set SystemRoot=%temp% start iexplore shell:::{3f6bc534-dfa1-4ab4-ae54-ef25a74e0107}
2
8
71
@notwhickey
¬ whickey
3 years
Have you ever considered Internet Explorer to be a #lolbin? By navigating to URI: `shell:::{3f6bc534-dfa1-4ab4-ae54-ef25a74e0107}` you can spawn `rstrui.exe` (System Restore). If you modify the `SystemRoot` environment variable and copy over DLLs you can run whatever you like.
Tweet media one
4
137
497
@bohops
bohops
3 years
The "Visual Studio Live Share" binary is a fun #LOLBIN to load an arbitrary DLL from the cmdline: vsls-agent.exe --agentExtensionPath c:\path\to\your.dll
Tweet media one
4
79
268