toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

230
active users

#offensivesecurity

0 posts0 participants0 posts today

Day 1 of posting to social media until I get an offensive security research job

First, I’m going to start with what I know – Windows. I need to recreate what I had access to at Microsoft, so that starts by setting up a dev environment and finding a copy of Windows System Internals, perhaps the greatest resource for learning Windows out there. My expertise is in Windows and virtualization, so I’m going to make sure I master those areas.

Next, I don’t think I want to grind coding exercises, but I do need to shake the rust off my coding skills. I think I’m going to start with some HackTheBox challenges and find some CTFs to participate in.

Finally, my long overdue goal: learn Rust. I’m not sure if this will help immediately, as I could choose to improve my knowledge of Python. But Rust was getting more and more popular in the areas of Windows I was tasked with protecting, so I need to learn what all the fuss is about with regards to memory safety.

If anyone is on a similar journey, let’s hold each other accountable in the comments! I will be sure to document any write-ups at blog.maxrenke.com (work in progress).

🇬🇧 💥 From payload smuggling to stealthy persistence...
This year, hashtag#leHACK 2025 talks are digging deep:
🕵️‍♂️ Cache me if you can – payloads via browser cache
🎭 The imposter’s guide to Hacking – with live demos
🎯 The Art of Staying In – unconventional backdoors on Windows & Linux

🚀 Explore the full lineup: lehack.org/2025/tracks/confere
🎟️ Don’t sleep on this : billetweb.fr/lehack-2025-the-s

------------

🇫🇷 💥 Du contournement au maintien d’accès furtif…
Cette année, les talks hashtag#leHACK2025 vont droit au système 😉 :
🕵️‍♂️ Cache me if you can – des payloads via le cache navigateur
🎭 The imposter’s guide to Hacking – avec démos en live
🎯 The Art of Staying In – backdoors atypiques sur Windows & Linux

🚀 Découvrez le programme complet : lehack.org/2025/tracks/confere
🎟️ N'oubliez pas vos places : billetweb.fr/lehack-2025-the-s
#Hacking #OffensiveSecurity #leHACK

🎙️ What happens when you combine the mindset of a red team with the precision of elite cybersecurity strategy? In this On Location Briefing from #RSAC2025, we find out how real-world impact is changing the game.

🚀 New Briefing from #RSAC 2025: From Red Teams to Real Impact — Bringing Artistry and Precision to Cybersecurity Programs

At RSA Conference 2025, Sean Martin, CISSP caught up with Charles Henderson, Executive Vice President of Cyber Security Services at Coalfire, to talk about the evolving role of offensive security — and why artistry, precision, and strategic thinking are becoming essential elements of the most effective cybersecurity programs.

🔐 How can organizations move beyond check-the-box testing to build truly resilient systems?

Find out how Coalfire is helping companies rethink offensive security as a critical driver of real-world cyber resilience and innovation.

🎙️ Watch, listen, or read the full conversation here:
👉 itspmagazine.com/their-stories

📌 Learn more about Coalfire’s work:
👉 itspmagazine.com/directory/coa

🛰️ See all our RSAC 2025 coverage:
👉 itspmagazine.com/rsac25

🌟 Discover more On Location Conversations, Brand Stories, and Briefings:
👉 itspmagazine.com/brand-story

🎥🎙️ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin and Marco Ciappelli covered the event as official media partners for the 11th year in a row.

Stay tuned for more Briefings, Brand Stories, and candid conversations from RSAC 2025!

🎤 Looking ahead:
If your company would like to share your story with our audiences On Location, we’re gearing up for #InfosecurityEurope in June and #BlackHatUSA in August!

⚡ RSAC 2025 sold out fast — we expect the same for these next events.
🎯 Reserve your full sponsorship or briefing now: itspmagazine.com/purchase-prog

🎙️✨ Here is a new Brand Story!

Guest: John Stigerwalt & Gregory Hatcher
Episode Title: No Manuals, No Shortcuts: Inside the Offensive Security Mindset at White Knight Labs

🚀 Marco Ciappelli and Sean Martin, CISSP are back — and this time, they’re chatting with the founders of White Knight Labsfor their first Brand Story with ITSPmagazine!

From learning on the field to building red teams to one of the toughest certification programs — John and Greg aren’t just playing the cybersecurity game. They’re rewriting it.

They don’t believe in cookie-cutter pen tests.
They simulate real ransomware attacks.
They write their own loaders.
And they only resell products they’ve personally tested in the wild.

🔥 Passion.
🔍 Precision.
🤝 Purpose.

🎧 Listen or watch now — and meet the team that’s raising the bar for offensive security:
📺 Video Teaser: youtu.be/VdGyPFhLAvU
👉 Full Podcast: brand-stories-podcast.simpleca

📌 Learn more about White Knight Labs on their Brand Page on ITSPmagazine:
itspmagazine.com/directory/whi

🎉 Join us in welcoming White Knight Labs to the ITSPmagazine family!
We already have three more conversations scheduled with them — you won’t want to miss what’s coming next.

Be sure to follow White Knight Labs and the Brand Stories with Sean and Marco podcast to stay connected with this exciting journey.

brand-stories-podcast.simpleca

Man, this whole AI hype train... Yeah, sure, the tools are definitely getting sharper and faster, no doubt about it. But an AI pulling off a *real* pentest? Seriously doubt that's happening anytime soon. Let's be real: automated scans are useful, but they just aren't the same beast as a genuine penetration test.

Honestly, I think security needs to be woven right into the fabric of a company from the get-go. It can't just be an afterthought you tack on when alarms are already blaring.

Now, don't get me wrong, AI definitely brings its own set of dangers – disinformation is a big one that springs to mind. But here's the thing: we absolutely *have* to get our heads around these tools and figure them out. If we don't keep pace, we risk becoming irrelevant pretty quick.

So, curious to hear what you all think – where do the greatest pitfalls lie with AI in the security field? What keeps you up at night?

Recon CFP ends in less than 2 weeks on April 28. Prices for the training and conference increase on May 1st. Register now to save with early bird price. We have already announced a few talks and workshops, and more videos from last year have been released. recon.cx #reverseengineering #cybersecurity #offensivesecurity #hardwarehacking @hackingump1 @mr_phrazer @nicolodev @SinSinology @hunterbr72 @clearbluejar @phLaul @oryair1999 @hookgab @TheQueenofELF @So11Deo6loria @i0n1c @pedrib1337 @MalachiJonesPhD @Pat_Ventuzelo @KB_Intel @pinkflawd @Reverse_Tactics @OnlyTheDuck @t0nvi @drch40s @BrunoPujos @mhoste1 @andreyknvl @texplained_RE @jsmnsr @pulsoid @SpecterDev @richinseattle @yarden_shafir @aionescu @hackerschoice @SinSinology @sergeybratus @SpecterOps @oryair1999 @phLaul @trailofbits @HexRaysSA @nostarch

Whoa, the IT security world was on FIRE this week! 🤯 Open source supply chain attacks, malware sneaking into the Play Store, ransomware bypassing EDR... and is AI just pouring gasoline on the phishing flames?! Seriously intense! 😳 Cloud security's getting a raw deal and let's be real, backups are only as good as their security.

It's wild how rapidly the threat landscape's evolving, isn't it? Gotta stay sharp, folks! Automated vulnerability scans? They're definitely nice, but manual penetration tests are still essential. And AI? Awesome tech, but also seriously risky. Disinformation and manipulation are spiraling out of control. We've gotta stay vigilant!

So, what are *your* biggest IT security pain points right now? Spill the beans!

5 reasons why working in #offensivesecurity is low-key amazing:

🧩 You get to solve problems creatively. Every day brings a new puzzle to crack which fires up your synapses and keeps you learning and growing.

🦾 You get to make a significant impact on security. Your expertise protects countless users and businesses, reinforcing the value of your work in the grand scheme of #cybersecurity.

🎢 You get to experience the adrenaline rush of finding an exploit that works! There's a thrilling sense of accomplishment when your skills get validated like that.

🤜🤛 You get to collaborate with a vibrant community. There's nothing like building meaningful relationships and a deep sense of camaraderie while working your way to professional - and personal - achievement.

🧱 You get to contribute to open-source projects. Giving back to the community through open-source contributions is highly rewarding because your work becomes a valuable asset your peers recognize and rely on.

What else comes up for you when you think of your work in #ethicalhacking

You know, a few months ago I said I was #hiring, I am now. So, if you're interested in #AI, #LLM, #Omnichannel and get #OffensiveSecurity at a #global scale, apply now. 



walmart.wd5.myworkdayjobs.com/

walmart.wd5.myworkdayjobs.comStaff, Incident Response Engineer - AI Red TeamPosition Summary... What you'll do... The Walmart Red Team’s mission is to provide valuable insights into our cyber security defenses and identify gaps and weaknesses that need to be addressed and continuously increase the resilience of Walmart against sophisticated attacks. By acting from a hostile perspective, we uncover digital, physical and social vulnerabilities and challenge our staff to react under real conditions.    About the Team:   At Walmart, we believe it is essential to keep innovating while safeguarding our data. Our team ensures that Walmart maintains a secure operating environment and the trust of our customers, associates, and stakeholders. We bring together a variety of services and capabilities to help prevent fraud, detect threats, and manage digital risk and access. In addition to mitigating attack risks and securing cloud transformation, we foster in our team members a secure and reliable working ethics.     What you'll do:  Perform testing on a wide scope of systems, including web applications, security controls, network infrastructure, wireless, and mobile deployments. Work as a team to explore the network until you reach their goal, taking time to avoid detection. Plan, execute, lead, and report on testing activities and outcomes. Execute covert operations to mimic adversary and threat actor tactics, techniques and procedures and work closely to test exploits.    What you'll bring:  Expertise in web application security and practical experience penetration testing in large e-commerce environments Ability to automate discovery and analysis of new web applications as they are deployed Practical Reverse Engineering and Vulnerability Research experience. Ability to translate reports and intelligence into real world attacks. Experience in offensive security tooling and development, including creation of scripts and debugging proof of concept code to leverage in campaigns. Strong knowledge of concepts and practices in infrastructure engineering and broad networking and systems experience either as a former administrator or in a formal red/blue/purple team role prior. Be able to leverage social engineering skills and understand human psychology for exploitation and persistence on campaign targets. Be able to parse and act on threat intelligence. Leverage awareness of tactics, techniques and procedures (TTPs) to mimic adversaries for scoped engagements. Be versant in technical writing for delivery of reporting to various leadership levels. Ability to clearly document and communicate findings and attack paths. Expertise relating to Machine Learning (ML) and Large Language Models (LLM) in both concept and adversarial actions    About Walmart Global Tech  From entry-level to executive positions, Walmart provides limitless opportunities for growth, and career development. Walmart started small, with a single discount store and the simple philosophy of selling more for less. Today, we are a growing technology-enabled company founded on the same values as our first store. We establish clear expectations, empower associates to manage their work, and hold ourselves and one another to a high standard. Walmart's scale enables us to have an. No other company has the reach of Walmart, with 2.3 million associates worldwide and over 230 million weekly customers. Walmart is reshaping retail by investing in an expanding workforce. While technology is at the heart of our digital transformation, people are the reason we succeed and the force behind our innovations. We train our team in the skillsets of the future and bring in experts like you to help us grow.     Flexible, hybrid work  We use a hybrid way of working that is primarily virtual, while remaining near the locations Global Tech calls home. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives and spend less time commuting. Of course, being together in person is an important part of our culture and shared success. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities.     Benefits:  Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include 401(k) match, stock purchase plan, paid maternity and parental leave, PTO, multiple health plans, and much more.     Equal Opportunity Employer:  Walmart, Inc. is an Equal Opportunity Employer – By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing diversity- unique styles, experiences, identities, ideas and opinions – while being inclusive of all people.     The above information has been designed to indicate the general nature and level of work performed in the role. It is not designed to contain or be interpreted as a comprehensive inventory of all responsibilities and qualifications required of employees assigned to this job. The full Job Description can be made available as part of the hiring process.    At Walmart, we offer competitive pay as well as performance-based bonus awards and other great benefits for a happier mind, body, and wallet. Health benefits include medical, vision and dental coverage. Financial benefits include 401(k), stock purchase and company-paid life insurance. Paid time off benefits include PTO (including sick leave), parental leave, family care leave, bereavement, jury duty, and voting. Other benefits include short-term and long-term disability, company discounts, Military Leave Pay, adoption and surrogacy expense reimbursement, and more. ‎ ‎ ‎ You will also receive PTO and/or PPTO that can be used for vacation, sick leave, holidays, or other purposes. The amount you receive depends on your job classification and length of employment. It will meet or exceed the requirements of paid sick leave laws, where applicable. ‎ For information about PTO, see https://one.walmart.com/notices. ‎ ‎ Live Better U is a Walmart-paid education benefit program for full-time and part-time associates in Walmart and Sam's Club facilities. Programs range from high school completion to bachelor's degrees, including English Language Learning and short-form certificates. Tuition, books, and fees are completely paid for by Walmart. ‎ Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to a specific plan or program terms. ‎ For information about benefits and eligibility, see One.Walmart. ‎ Reston, Virginia US-07759:The annual salary range for this position is $132,000.00-$264,000.00 ‎ Bentonville, Arkansas US-09050:The annual salary range for this position is $110,000.00-$220,000.00 ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ Additional compensation includes annual or quarterly performance bonuses. ‎ Additional compensation for certain positions may also include: ‎ ‎ - Stock ‎ ‎ Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 4 years’ experience in incident response or related area at a technology, retail, or data-driven company.Option 2: 6 years’ experience in incident response or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certifications in Security+, Network+, GISF, GSEC, CISSP, CCSP, or GCIH, Master’s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity or related area and 2 year’s Exposure of leading/ working on Information Security / Cybersecurity Projects, We value candidates with a background in creating inclusive digital experiences, demonstrating knowledge in implementing Web Content Accessibility Guidelines (WCAG) 2.2 AA standards, assistive technologies, and integrating digital accessibility seamlessly. The ideal candidate would have knowledge of accessibility best practices and join us as we continue to create accessible products and services following Walmart’s accessibility standards and guidelines for supporting an inclusive culture. CISSP - Certified Information Systems Security Professional - Certification Primary Location... 10790 Parkridge Dr. Suite 200, Reston, VA 20191, United States of America About Walmart: Fifty years ago, Sam Walton started a single mom-and-pop shop and transformed it into the world's biggest retailer. Since those founding days, one thing has remained consistent: our commitment to helping our customers save money so they can live better. Today, we're reinventing the shopping experience and our associates are at the heart of it. You'll play a crucial role in shaping the future of retail, improving millions of lives around the world. This is that place where your passions meet purpose. Join our family and create a career you're proud of.

Calling all red and blue teams! Register NOW for the third year of Beacon: London's social knowledge exchange for hackers and hunters.

Thursday 5 September 2024 in Hackney Wick, London.

Should be the biggest Beacon yet with an awesome and growing line-up of red team gangsters from around the globe.

Held in a hyper-real hacker green™ event space at the Digital Institute London. Quality, fresh hot lunch and ice-cold drinks on the house as usual.

After-party til late at the 1990s video game arcade - expect Red vs. Blue team Time Crisis mayhem!

We'd love to hear your ideas for a talk.

eventbrite.co.uk/e/beacon-c2-t

#redteam #offensivesecurity #london #londonevents #hackneywick #hackney
#redteaming #blueteam #soc #security #edr #hacking #hackers #ethicalhacking #cybersecurity #cyber

We asked our Red Team Practice Director Trevin Edgeworth what long-standing unpatched #vulnerabilities can indicate to a Red Teamer. He uses the examples of two vulnerabilities that have gone unpatched for several years: an RCE flaw in Microsoft Office used to deliver spyware and a vulnerability in the popular #GWT framework discovered by Ben Lincoln. bfx.social/3RK49YE

Bishop FoxNews Insights: Patch Procrastination with Trevin Edgeworth, Director…Bishop Fox's Trevin Edgeworth, spotlights notable vulnerabilities - left unpatched for years and discusses how unpatched vulnerabilities can wreak havoc.

Take a look into what sets the Bishop Fox approach to tabletop exercises in #RedTeaming apart. Senior Red Team Consultant @alethe shares how our team focuses on these highly beneficial exercises as building blocks for stronger #security programs versus mandatory compliance tasks. bfx.social/3H7Ech2

Bishop FoxValidating Incident Response Plans with Red Team Tabletop ExercisesLearn how Red Team tabletop exercises help organizations test Incident Response plans against tactics, techniques, and procedures used by attackers.

“Healthcare organizations prioritize #offensivesecurity testing for their internal and external networks (50%) and #IoT testing/product security (51%) at a slightly higher rate than other industries (47% and 49%). This is mostly due to government regulations, such as #HIPAA, & recommendations from certification agencies.”

Read this overview of our #PonemonInstitute industry cut to discover more about offensive security in healthcare, and how you stack up against your peers.

bfx.social/3RjLDaI

Use the new #opensource tool Swagger Jacker to audit OpenAPI definition files, allowing you to identify potential vulnerabilities or misconfigurations in API routes defined within the definition document. Learn how it works, how it can make auditing API endpoints less tedious, and more in this tutorial from Tony West.

#OpenAPI #pentesting #offensivesecurity

bfx.social/47Zubyk

Bishop FoxIntroducing Swagger Jacker: Auditing OpenAPI Definition FilesDownload Swagger Jacker, an open-source tool made for penetration testers that enables better auditing of OpenAPI definition files. Learn more here!

Increasingly challenging times in #security demand a new approach.

Purple Teaming, a symbiotic merger of Red Team offense with Blue Team defense, has emerged as a promising #offensivesecurity solution. Discover how this technique can help you achieve multiple goals for your organization – and don’t forget to stream our #BFLive recording if you missed the original broadcast!

bfx.social/3RfQdFE

Bishop FoxPurple Teaming: Validating Cybersecurity Investments and Enhancing…Learn how Purple Teaming brings together offensive and defensive strategies for a more comprehensive and impactful cybersecurity approach.

How do you get organizational buy-in to stop viewing #cybersecurity as a cost and start seeing it as an investment? Join Ryan Basden to learn how the adoption of Purple Teaming initiatives can help demonstrate ROI and secure revenue.

bfx.social/3QS1dcc

www.linkedin.comPurple Teaming for Security Success: Enhancing ROI and Facilitating Growth | LinkedInCybersecurity programs are widely accepted as a cost-of-doing business for most organizations in the modern digital age, yet it often comes at a significant price tag and financial burden. The most significant exception to this view is in compliance, where security teams are often heavily involved due to the technical nature of evidence gathering. It's challenging to argue against this perception, as compliance reports directly contribute to revenue and can prove instrumental in securing multi-million dollar deals. So how can security professionals compete for budget allocation and garner internal support from decision-makers to bring about organizational change and improvement? Join our webcast to hear Ryan Basden, Red Team Security Consultant II, explore how the adoption of Purple Teaming initiatives can help an organization demonstrate tangible ROI for security teams and facilitate securing existing and future revenue. Learn how cybersecurity can transition from a perceived cost center to a tangible asset driving organizational development and revenue protection. Our webcast will examine actionable approaches, supported by real-world examples, to show how Purple Teaming can: • Establish measurable security baselines and resilience across companies and supply chains • Validate the effectiveness of security investments and identify areas for increased efficiency • Provide a blueprint for organizational advancement and agility through penetration tests and Red Teams • Enable evidence-based ROI communication to leadership and stakeholders • Offer demonstrable and continuous protection against headline-grabbing, investor-rattling emerging threats. (If there are any technical snags, feel free to watch on our YouTube channel.)