@D3adL1st Profile picture

Roy Luongo

@D3adL1st

cybersecurity professional. ~my opinions are my own~

Joined September 2008
Similar User
Doug Stilwell photo

@lepwn

Dave Mayer photo

@dmay3r

Shaun McCullough photo

@TheCybergoof

Mayasoft photo

@mayasoft_tr

Albert photo

@albertcorenw

Robert Schwass photo

@MRSchwassRobert

Robert photo

@usarjp

Mario Calderon photo

@cybermc_

If you cancel your news subscription because your supposedly unbiased news source won’t endorse your candidate, are you really looking for an unbiased news source? If you feel you are paying for that endorsement, you aren’t paying for news you’re paying for validation.


Roy Luongo Reposted

🎃 Join @thecybergoof for a frighteningly practical webcast on October 30th! You'll learn: ☁️ The benefits of Lambda functions ⚠️ Common misconfigurations 🕵️ How attackers exploit weaknesses 🔐 How to defend your deployments Register now at, buff.ly/401Iykj


Roy Luongo Reposted

What can be better than lambda and Halloween?

🎃 Join @thecybergoof for a frighteningly practical webcast on October 30th! You'll learn: ☁️ The benefits of Lambda functions ⚠️ Common misconfigurations 🕵️ How attackers exploit weaknesses 🔐 How to defend your deployments Register now at, buff.ly/401Iykj



Roy Luongo Reposted

Annual reminder that Edward Snowden is a traitor.


Every year, I see all the DEFCON posts and miss the community so much. One year, I might make it again, but I was busy. I am in there somewhere, hitting someone!

Tweet Image 1

Final got to reading this book(?). The author(?) Is either a genius orn madman. Maybe both.

Tweet Image 1

Roy Luongo Reposted

Wyze is blaming a caching library for allowing 13,000 customers to see into each other’s homes. As a result of increased demand, it mixed up device ID and user ID mapping and connected to incorrect accounts. In other words, the library was not load tested. theverge.com/2024/2/19/2407…


Well darn.. guess I am not running in the "right" circles either

I use oh-day and zero-day fairly interchangeably. This means I’m unlisten-to-able and don’t actually roll in infosec circles.

Tweet Image 1


I just caught a The ChocoChandelier Goldnipper in the Geese Islands while playing @SANSInstitute’s Holiday Hack Challenge 2023! Come fish with me at sans.org/holidayhack. #HolidayHack


I just caught a Fantaray Flakefin in the Geese Islands while playing @SANSInstitute’s Holiday Hack Challenge 2023! Come fish with me at sans.org/holidayhack. #HolidayHack


Roy Luongo Reposted

Wait, what is this grainy image? And what could it possibly have to do with #holidayhack? Maybe it's totally unrelated. ...

Tweet Image 1

Roy Luongo Reposted

Mimikatz punching into LSASS process address space...

Tweet Image 1

Nice!

Got those kerberos clock skew woes? Tired of messing with Faketime? I got you, meet rdate, learned about it while doing a HTB and have loved it ever since. (It syncs your time to the DC's NTP with a single command and not a lot of flags to remember)

Tweet Image 1


Roy Luongo Reposted
Tweet Image 1

usajobs.gov/job/745369700 Looking for an ISSM to join our team. If you know anyone interested please pass it along.


I have questions.. mostly around revocation. I am glad to see something that we can use as a starting baseline and standard, but it has to come with a way to revike or acknowledge something no longer meets the standard. duo.com/decipher/white…


I know the Fairfax schools apologized for phishing their teachers at the end of the year, but they kind of proved the point with all the clicks they got. Stop thinking unsophisticated phishing exercises prove you're safe.


Roy Luongo Reposted

The MOVEit Transfer exploitation is not just SQL injection(👀) We uncovered the very last stage of the attack chain to drop human2.aspx ultimately ends up gaining remote code execution ‼ We fully recreated the attack chain with a demo achieving a reverse shell & ransomware!


these are good circles!

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.