Senior Security Analyst / Threat detection lead

Joined October 2011
Michel de CREVOISIER retweeted
So funny to see marketing people generate leads with “ransomware protection guides” which are basically the harding guides we used 20y ago except that everything is mapped to ATT&CK nowadays
15
89
7
399
Michel de CREVOISIER retweeted
System Design Blueprint: The Ultimate Guide blog.devgenius.io/system-des… #Pentesting #CyberSecurity #Infosec
30
125
Michel de CREVOISIER retweeted
After 28 years, SSLv2 is still not gone from the internet... but we're getting there i5c.us/d29908
11
1
21
Michel de CREVOISIER retweeted
.@Sloqman et al.: Who Squats IPv4 Addresses? dl.acm.org/doi/pdf/10.1145/3… [PDF]
2
5
16
Michel de CREVOISIER retweeted
I wrote this little #PowerShell module that wraps around DSInternals and provides password quality scan for #ActiveDirectory forest but adds some quality reporting around it. Wrote a short blog post on usage and general description evo.yt/y7oq
14
149
1
474
Show this thread
Michel de CREVOISIER retweeted
🚨 "A Practical Approach to Breaking & Pwning Kubernetes Clusters" training in #BHUSA. Learn to perform #Kubernetes, Cloud Native #Security, #Pentesting, Assessments, & Architecture reviews 🚀 Register before early bird pricing ends blackhat.com/us-23/training/… #Hacking #RedTeam
1
23
100
Michel de CREVOISIER retweeted
3
105
4
308
Michel de CREVOISIER retweeted
while trying to avoid API hooking for service creation (calling into RPC directly) they generate a more suspicious windows service creation event 4697 (clientpid is eq to 0x0 only for remote) Existing detection for this anomaly github.com/elastic/detection…. trendmicro.com/en_us/researc…
27
89
Michel de CREVOISIER retweeted
Lateral movement is a technique that cyber attackers use to search for high-value assets. Developed and supported by Stamus Networks, this #Suricata ruleset is specifically focused on detecting lateral movement in #Microsoft #Windows environments. hubs.la/Q01QyH1z0
10
27
Michel de CREVOISIER retweeted
I created this quick and dirty Powershell script to check your current system drivers against the awesome loldrivers.io list from @M_haggis @_josehelps @nas_bench Hope you find it useful gist.github.com/api0cradle/d…
15
143
4
422
Michel de CREVOISIER retweeted
My team mate @m_fielenbach recently created a python script to automate the process of discovering and exploiting ESC1 & ESC8 ADCS vulnerabilities: 🙌 github.com/grimlockx/ADCSKil… So if you want to save some minutes of time in your next projects feel free to test it out. 🔥
6
181
3
466