Hacker/CTO @TrustedSec | Former Optiv/SecureWorks/Accuvant Labs/Redspin | Race cars

Buffalo, NY
Joined April 2008
7 defcon tickets or 1 VR headset 🤔
3
2
1
19
Justin Elze retweeted
Just picked up a new O'Reilly book. Anybody read this one?
12
16
4
55
Im finally going to be able to hack like this
6
1
45
Journal the ultimate crime ledger
1
2
Justin Elze retweeted
Official blog from Progress on the MOVEit vulnerability. This includes our TA attribution to Lace Tempest. If you're aware of any org receiving an extortion attempt related to data exfil through this vulnerability, please DM me, I'd love to hear more. ipswitch.com/blog/update-ste…
21
1
44
yikes
So GigaByte Control Center adds a GCC-Filedrop user account to enable 'file transfer' functionality between hosts running their Control Center software... but then configures it with a default "gbt123gcc" password. 🤔
1
3
16
It’s probably going to be another 8-12 months before I stop being amused by MS TA naming conventions.
7
21
Getting to see a project come to life after a 6 month build is awesome. He wrecked his last race car at 170 end of last season and it’s been a rush to have something competitive for this season. tweeter.jakobs.systems/i/web/status/166…
3
26
1,096
What sort of event does one wear a lace tempest at? Formal dinner party?
7
1
17
Microsoft is attributing attacks exploiting the CVE-2023-34362 MOVEit Transfer 0-day vulnerability to Lace Tempest, known for ransomware operations & running the Clop extortion site. The threat actor has used similar vulnerabilities in the past to steal data & extort victims.
8
390
35
773
Show this thread
$440 😳
45
8
8
116
It's funny I found myself talking about data backups/retention with a bunch of drag racers yesterday. Data logs and the ability to quickly review them and pull up previous runs from months or years prior is extremely important. I got a couple people using Google drive now as… tweeter.jakobs.systems/i/web/status/166…
5
1
34
Justin Elze retweeted
📣📣 We are 2 weeks away from #NahamCon2023! This year's event is hosted by @_JohnHammond, @ippsec, and @Alh4zr3d! Check out the full schedule on NahamCon.com!
2
38
3
250
Show this thread
Justin Elze retweeted
"Mandiant has observed wide exploitation of a zero-day vulnerability in the MOVEit Transfer secure managed file transfer software for subsequent data theft." UNC4857 observed actively deploying the LEMURLOOT webshell post-exploitation. mandiant.com/resources/blog/…
2
52
1
86
Justin Elze retweeted
Looking at the C# diff the `SetAllSessionVarsFromHeaders` function was removed in patched versions. The machine2.aspx file leads to this functionality. The machine2.aspx file requires requests coming from localhost. You can achieve this through…
Okay I'm down a rabbit hole but I'm wracking my brain on this, desperately wanting to figure out how the #MOVEit exploit comes together. We've got in the known IIS logs a procedure (coming disjointly from different IPs) that hits up - moveitisapi.dll - guestaccess.aspx etc
Show this thread
3
7
1
64
Clean A to B pass 4.9x at 149 tune up is a little rich
4
28
1,447
We made a mistake of being overly prepared for first qualifier today sat here excited everything was going well went to qualify and car wouldn’t start 30 min of troubleshooting and a tune change made a hit and spun
5
32