mathias boosted

Watching again after my first time a a few months after that video came out. Pointing to this section of the video in particular because while a lot is being said about the steps to detection nothing much in terms of the lead up to the first 'smell' of an attack.
Imagine seeing that graph as an alert fatigued analyst. This is where security automation comes in. And yes, I'm going to add a buzzword in it, ML via risk classification engines rather than handmade scoring.

I also plan to write an abbreviated version on next week if you're not up to reading almost 80 pages :p

Show thread

hence, this is what I wrote my thesis about: rubberduckies in a forensic environment

if you wanna read it, it's freely available here:

Show thread

So it's actually not that cut and dry, because I looked at p4wnp1 and other existing solutions to be used in a forensic setting, but they never seem to really fit my specs.

Show thread

tired: use existing rubberducky solutions
wired: create a new one in circuitpy 👀

I'm back, with one degree more than when I left!

I think my instance is stable enough to move to, so I think I will do just that.

Thanks for hosting me this long time @jerry , all the best!

mathias boosted
mathias boosted

Happy New Years, ya filthy animals! 🦙🐫🐄🐑🐈🐓🐏🦏🐆🐅🦝🐿🐇🐀🕊

So I'm moving to a pleroma instance I set up at , but I have some problems. Often it logs "Signature missing or not from author, relayed Create message, fetching object from source"

To people actually understanding pleroma, is this normal? I'm not sure if web push keys are correctly configured...

Please don't vote Democrat. I still need trump in office longer so I can have a bigger data set for my impersonation bot.

mathias boosted
Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.