Bad Horse 🐎

118 Followers
93 Following
451 Posts

~The Thoroughbred of Sin

I feel like it's okay to put this here. Since no one knows who tf I am, I'm not outting anyone:
Proud dad of a 16 year old trans boy, an 11 year old special needs boy, and 3 year old boy who is actually fury incarnate (but adorable fury!).

Loving husband. Fortunate enough to have married a feelings/intelligence-clone of myself. We are seriously the same person but with different naughty bits.

LGBTQIA2S+ ally
Women's rights advocate
Worker's rights advocate
Equal rights advocate
I'm for anything that puts everyone on the same playing field.

Cyber Security (Vulnerability Management mostly) for a Fortune 500 Corpo

Cyberpunk

Tinkerer of electronics.

Developer of stuff (mostly JavaScript and Python)

Musician

Lifelong learner

and ... part time villainous horse?

Haven't been in cyber security all that long. Been hacking around since the 90s, but only to suit my own needs. Everyone here is way cooler than me and I hope to learn all the things from them.

@boblord said some pretty impactful things today at VulnCon. One of the things I'm taking to heart, and would ask of the rest of the community was "We should be increasingly intolerant of [unforgivable vulnerabilities]". To me, that means we need to call out and stop consuming products of companies who don't invest in their vulnerability management (or security in general). If a company has a product with a vuln that shouldn't exist this day in age, we need to stop empowering them with our dollars and start bringing awareness to how dangerous their products are for the entire world.
RIP Steve Katz :(
I'm sorry, did you forget the last 200 years of technological progress advancing productivity yet leading us to work even longer hours? If we want to work less, we need unions, not tech.
Project management simplified. You may thank me later.
Been playing with Beau Bullock's GraphRunner post-exploit tool in my org's Azure. Wow, what an amazing tool! Even with a low-priv user, the amount of data you can gather is pretty nuts. Beau's webcast is tomorrow, be there or be square. https://blackhillsinfosec.zoom.us/webinar/register/WN_6g9j6BqkQ0-2T49xO4ZHHA
Welcome! You are invited to join a webinar: GraphRunner: A Post-Exploitation Toolset for M365 – Beau Bullock & Steve Borosh | 1-Hour . After registering, you will receive a confirmation email about joining the webinar.

In the rapidly evolving realm of cloud productivity suites, Microsoft 365 (M365) has solidified its position as a fundamental resource for numerous organizations. While M365 presents a host of opportunities, it equally introduces challenges. By default, M365 offers a range of security measures within its tenant structure. However, it also contains a number of default configurations that hold the potential for exploitation by malicious actors. This talk focuses on a new post-exploitation toolset called GraphRunner, that can be used to exploit certain default M365 configurations. During this Black Hills Information Security (BHIS) webcast, Beau and Steve will provide an in-depth exploration of GraphRunner’s features, showcasing its role in elevating post-exploitation strategies. Designed to empower both red team professionals and defenders, this toolset equips users with a means to navigate the intricate Graph API at the heart of M365 and manipulate it for offensive purposes. GraphRunner offers functionalities that aid in lateral movement, data exfiltration, privilege escalation, and persistence within M365 accounts. By offering practical demonstrations of the toolset’s capabilities, this talk aims to bridge the gap between theoretical attack concepts and their tangible real-world application. Chat with your fellow attendees in the Black Hills Infosec Discord server here: https://discord.gg/BHIS -- in the #webcast-live-chat channel.

Zoom

A new DDoS (distributed denial of service) technique named 'HTTP/2 Rapid Reset' has been actively exploited as a zero-day since August, breaking all previous records in magnitude.

https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/

New 'HTTP/2 Rapid Reset' zero-day attack breaks DDoS records

A new DDoS (distributed denial of service) technique named 'HTTP/2 Rapid Reset' has been actively exploited as a zero-day since August, breaking all previous records in magnitude.

BleepingComputer
HTTP/2 Rapid Reset: deconstructing the record-breaking attack

This post dives into the details of the HTTP/2 protocol, the feature that attackers exploited to generate the massive Rapid Reset attacks, and the mitigation strategies we took to ensure all our customers are protected

The Cloudflare Blog

OK So I am truly humbled and honored that anyone thought I was deserving to be nominated let alone a finalist. Looks like voting is now through October 10th. My name included with a ton of great folks. #SANSDMA @SANSInstituteOfficial @thehackervalley

https://survey.sans.org/jfe/form/SV_3OA2pURJ7VU8d7g

SANS Difference Makers Awards 2023 - Community Voting

Community Voting - SANS Difference Makers Awards (DMAs) 2023

Won this in a raffle during @InfoSecSherpa 's excellent presentation at @BSidesRDU . Thank you @crdotson, @InfoSecSherpa, and @BSidesRDU !