Kcin418

My other computer is your bluetooth toaster

2023-05-06

@BagheeraAltered the hardest part is choosing the ASCII art to display in the terminal when the script is run! I spend 50% effort working on a script, the other 50% selecting some absurdly silly ASCII art to go with it

Kcin418 boosted:
Aidan Raney ➡️ DefCon 2023devaidan@infosec.exchange
2023-02-21

I'm excited to be presenting with @Kcin418 at both @bsidessf and @bsidesroc this year. Siked to have the full hour or so to talk more about my work investigating a massive Facebook credential harvesting campaign (over 200 million creds). #BSidesSF #BSidesROC @bsidessf @bsidesroc @Kcin418

2022-11-23

@thepacketrat if you find someone let me know. I’ve been tracking a group targeting them and a few other exchanges for a while now. They cycle through domains a LOT for most exchanges they target, but very rarely need new domains for crypto.com as they aren’t getting burned by them (lol?)

I just wrote a blog about it:
pixmsecurity.com/blog/phish/cy

bleepingcomputer.com/news/secu

2022-11-21

Been working on this investigation for a while, excited to see it getting some coverage!

TL;DR: bad guys are continuing to do bad guys things

bleepingcomputer.com/news/secu

2022-11-16

Dinner time just hasn’t been the same since my kitchen appliances were unwilling participants in the Mirai botnet.

2022-11-16

I wrote this lil Python script a couple years ago to pull out PDB Paths from large malware sample repos and run them through Sherlock to see if the usernames are active handles on various platforms. Always find some crazy stuff (samples from totally seperate campaign tied back to the same author, usernames that point to devs IRL identities, reused PDB paths to cause mis-attribution) when I run it still.
github.com/SecurityRiskAdvisor

2022-11-16

I check malware repos out of pure curiosity every once in a while to check if malware authors are still leaving their username (and occasionally full legal names) in the PDB Path of their PE’s. They still are. Some things change, some stay the same.

2022-11-10

Fun fact if you download then run exiftool against an internet facing file people are editing in Sharepoint Online or Onedrive you get some really interesting metadata about the file, the users, and the Sharepoint tenant (example is just a few of the fields, there’s often quite a bit more).

Share point file metadata
2022-11-10

How my dog looks at me when I get a reverse shell (slightly condescendingly?)

Cute dog
2022-11-10

@alyssam_infosec going to speak with legal about changing our name to “Red Blue Zero One Net”

2022-11-09

Want to get in touch with your enterprise security team? Here are some helpful tips!

[the professional way] send an email

[the correct way] start using certutil -urlcache instead of curl to download files

2022-11-09

I’m here to post dumb thoughts and Python scripts … and I’m all out of Python scripts

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst