@Alex_S_Kot Profile picture

Alexander Kot

@Alex_S_Kot

#InfoSec #WiFi #FOSS #Linux #Firmware Thoughts are my own and not of my employer.

Joined October 2012
Similar User
Sno0ose photo

@sno0ose

Rockie Brockway photo

@RockieBrockway

Gillis Jones photo

@Gillis57

Jim Kennedy photo

@TonikJDK

cryptopotato photo

@cryptoishard

SecureWV photo

@SecureWVCon

SciaticNerd@infosec.exhange & bsky photo

@SciaticNerd

Caroline photo

@cxstephens

Whiskey photo

@jmcmurry

Ben photo

@Pl1nko

Scott Thomas photo

@Secureholio

Chaos Monkey photo

@grap3_ap3

ArmyTra1n3d photo

@ArmyTra1n3d

Kyle 'esSOBi' Stone photo

@essobi

Adam Compton (@tatanus@infosec.exchange) photo

@tatanus

Hey @gotmilk and @TheBoysTV when you going to do a collab?


Alexander Kot Reposted

Elden Ring Anime Opening #EldenRing 🔗 octobersveryown616


Alexander Kot Reposted

What was the first software you cracked? 🥹

Tweet Image 1
Tweet Image 2

Complains HIPAA is outdated because of incident with UHG. List of companies addressing how outdated HIPAA is… en.m.wikipedia.org/wiki/HITRUST

Tweet Image 1
This post is unavailable.

Hot take. Citrix is more expensive and less secure than deploying laptops. With EDR you have no reason to use VDI. Show me one Citrix admin who maintains a secure gold image! Also network issues are a nightmare. Why I ripped Citrix out my org.

For Citrix? I work in healthcare where half my EMR don’t support SAML. Clearly Change Healthcare has MFA adoption. Though Citrix is rare and complicated.



Alexander Kot Reposted

This year's @HackSpaceCon badge included an ATtiny-controlled LED matrix — complete with an RGB party mode feature. hackaday.io/project/195598…


Are. 1. MFA adoption level 2. Have an adversary simulation (unscoped pen test) 3. Partnerships with IT, Legal, Risk, Compliance, and HR 4. Can your EDR/SIEM detect net,whoami, or other lolbin commands if not deploy Sysmon 5. Proper inventory list including external domains/IPs

If you were (or are) a CISO, what are your 5 non-negotiables? For me: 1. If it's vulnerable, it's being patched 2. Connecting to a VPN? You are coming from a device I trust. 3. MFA everywhere. 4. Any security tools are fully deployed and actively monitored 5. I get all the logs



Alexander Kot Reposted

If you were (or are) a CISO, what are your 5 non-negotiables? For me: 1. If it's vulnerable, it's being patched 2. Connecting to a VPN? You are coming from a device I trust. 3. MFA everywhere. 4. Any security tools are fully deployed and actively monitored 5. I get all the logs


Second. Our company had training before with Steven great information!

Want to learn Windows forensics by @TrustedSec IR people in one of the coolest settings ever? Now you can! hackspacecon.com/tactical-windo… #dfir



Got my original PlayStation on clearance liquidation.

Tweet Image 1

Age yourself with a store that no longer exists.

Tweet Image 1


Alexander Kot Reposted

Age yourself with a store that no longer exists.

Tweet Image 1

Age yourself with a store that no longer exists.

Tweet Image 1


Alexander Kot Reposted

Canada's PM Trudeau has gone full dictator


Alexander Kot Reposted

This is an incredibly obtuse answer by the president of @signalapp I trust Signal -- but now this answer makes me doubt whether I should. How can anybody in this business believe that "decompile the binary" is any sort of assurance against backdoors or untrustworthy behavior???

Decompile the binary? Check our open source repos? It's all there to review and scrutinize, for the paranoid and anyone else.



The amount of people trying to wrongfully explain RFC1918 hurts. It’s a two second google, yet people are arguing…even someone who supposedly had a CCNA.

Not this girl



When you see the new twitter/X logo and you remember the days of updating a config file to change the resolution of your monitor.

Tweet Image 1

As an industry can we stop calling this a bypass and just say Lack of EDR detection. You have thousands of file type and thousands of ways to handle them. No EDR promises to handle them all properly.

For instance: Writing your malicious VBA macro in the legacy WordBasic6 engine via WordBasic methods instead of traditional VBA7+ causes malicious code to execute without detection.



Alexander Kot Reposted

Stay tuned for some exciting news on 2023 and all things Hack Red Con!


Time for some quarterly Okta Memes

Tweet Image 1
Tweet Image 2
Tweet Image 3

Loading...

Something went wrong.


Something went wrong.