@SteveVanasche77 Profile picture

$V

@SteveVanasche77

💾 CyberSecurity Analyst | ​ 👨‍💻​CEH - SIR

Similar User
Silvia Fel photo

@Silvia_Felici

reecDeep photo

@reecdeep

AudioHead photo

@TheAudioHead

Brunella modularis photo

@BModularis

Andrea Surbone photo

@andreasurbone

Specter photo

@MagdyHenidak

Cinzia Ercolano photo

@cinzia_ercolano

Bionda 🎀 photo

@sonobiondascusa

JJG, photo

@JAMES10GG

Gh0sT*23 photo

@InfoSecLeader

Rida Benguettaia photo

@BenguettaiaRida

Paolo photo

@pavel_cmp

Netbanger photo

@Netbanger4

vanellope photo

@solclarin

jacopo morelli photo

@jacopomorelli1

$V Reposted

Analyzed a phishing case in M365: attacker bypassed MFA using axios HTTP client, leaving a telltale "axios/1.7.7" in sign-in logs. Lesson: regularly check sign-in logs for unusual user-agents to spot suspicious activity.

Tweet Image 1

$V Reposted

what's else is missing?

Tweet Image 1

$V Reposted

I developed an SSH client rootkit to test EDR detection. When a user logs in, it captures the root password and sends it covertly via a DNS TKEY record. With high daily DNS traffic, EDR systems are unlikely to flag this, as analyzing every query would impact performance.

Tweet Image 1

$V Reposted

In 1974, Steve Jobs came to India in search for enlightenment. 7 months later, he returned with a philosophy that would later build Apple into a $1 trillion empire. Here’s the philosophy: 🧵

Tweet Image 1

$V Reposted

1/X Here's some details on recent SOCGholish / FakeUpdates initial infections and the TDS (Keitaro?) that goes along with it. This loader uses compromised sites to display a fake "browser update" themed lure that, when clicked, downloads the malware.

Tweet Image 1

$V Reposted

This incident was identical to the behavior of a compromised account as described in this recent article microsoft.com/en-us/security… --- TimeLine (9 days session) --- [Day 1] Initial Compromise - The victim received a phishing email with a subject line similar to "… shared ……

Tweet Image 1

zoomed, same scale with different colors

Tweet Image 1


Cyberoo’s research on the illegal sale of a database with 60 million Italian records reveals a critical need for stronger data protection.

Tweet Image 1

$V Reposted

Had occassion to dig into ADCS and SCCM for the first time. Seriously impressive work from @tifkin_, @harmj0y, @subat0mik, @_Mayyhem and others over at @SpecterOps Super professional presentation of information which led to some high impact easy wins. github.com/subat0mik/Misc…


$V Reposted

🚨🕷️ Proud to share my latest research on the LUNAR SPIDER campaign. Our findings reveal how RaaS operators leveraged LUNAR SPIDER’s malware, including IcedID and the Latrodectus loader, along with Brute Ratel C4 infrastructure, to enable their attacks on the financial sector.…

Tweet Image 1

$V Reposted

Working on a script that, when run, automatically extracts all browser data on the system—including passwords, cookies, history, and bookmarks—and sends it to my server.


$V Reposted
Tweet Image 1

$V Reposted

This book is one of the best that gets into memory forensics, exploring how to analyze memory dumps for security investigations. It beautifully covers the structure of memory, process address spaces, and techniques for uncovering evidence of malware or attacks.

Tweet Image 1

$V Reposted

Offensive Security Tool: TerminatorZ TerminatorZ is developed by Chris Abou-Chabké from Black Hat Ethical Hacking and is an efficient web security tool designed to scan for potential vulnerabilities in your web applications. It uses a combination of advanced techniques and…


Loading...

Something went wrong.


Something went wrong.