Advertisement · 728 × 90

Posts by Tim Medin

Post image

I decided to chat with a spammer/scammer. I found them to be pretty honest and forthcoming.

3 months ago 4 0 1 0

Apple's Liquid Glass was cool for like 1 minute.

3 months ago 0 0 1 0

I have debated declaring email bankruptcy many times. Haven't done it... yet.

4 months ago 3 0 0 0

My "Death by Dashboards" talk from WWHF is up!

4 months ago 2 2 0 0
Post image

Months of battling, and I won. Inbox zero.
... for now.

4 months ago 3 0 1 0

Microsoft created Get-KerbEncryptionUsage.ps1 (see link in article) to query the event log to see which encryption types Kerberos used within your environment.
Run this, find the ones that MUST use RC4, and burn the rest. Then figure out how to upgrade the others from RC4 or pick a great password.

4 months ago 2 0 0 0

The ones here are obnoxious. But there’s a charm about Wisconsin alcoholics that Minnesota alcoholics just don’t have.

4 months ago 4 1 0 0

I can't spell that stupid word correctly... ever

4 months ago 2 0 0 0
Preview
Beyond RC4 for Windows authentication As organizations face an evolving threat landscape, strengthening Windows authentication is more critical than ever.

"By mid-2026, ... Windows Server 2008 and later to only allow AES-SHA1 encryption. RC4 will be disabled by default and only used if a domain administrator explicitly configures an account or the KDC to use it."
www.microsoft.com/en-us/window...

4 months ago 0 0 0 1
Post image

I love WI airports.
Concourse beers are not only legal, but it’s encouraged with signs all over the airport.

4 months ago 9 0 2 0
Advertisement

“Killer” lol
So bad. ;)

5 months ago 4 0 1 0
Post image

I'm home after teaching Offense for Defense at NineStart Connect. They offered free (yes, free) training to whomever wanted to attend. I can't thank them enough for offering this to our community!

The class is available here: training.redsiege.com (affordable, not free... sorry you missed out 😉)

5 months ago 4 0 0 0
Post image

Wrapping up @defcon.bsky.social Bahrain at the ICS Village.
Not my best picture, but excellent photo bomb.

5 months ago 7 0 0 0
Post image

Damn.
I’m never going to find this room.

5 months ago 282 41 9 1

Two days of teaching Pen Testing: Beyond the Basics ✅
Two hour Kerberos workshop ✅
Talk ✅
Tomorrow, time to be a full time booth babe.

6 months ago 8 0 0 0
Post image

Last year at @wildwesthackinfest.bsky.social a few packages arrived late (not mine). The maintenance staff regularly receives packages and thought it was theirs. They opened it, found a pack of stickers.
They have been putting them on their stuff and the hotel.
"We wondered who that guy was"

6 months ago 4 1 1 0
Post image

Senior Security Consultant Justin Palk tells you everything you need to know about getting started with proxy chains in this blog 🔗 redsiege.com/proxychains

#hacking #infosec #cybersecurity

6 months ago 1 1 0 0

The booth is hopping! Stop by to get tons of stickers, a shirt, and get entered to win a framed autographed picture from Hackers.

6 months ago 1 0 0 0

Join us tomorrow!

6 months ago 0 0 0 0
Preview
Anti-Cast: Close Security Gaps, Pass Audits, Stay Secure with Kimber Amos - Antisyphon Training Join Kimber Amos for a free one-hour training on cutting through compliance theater and running reviews that actually strengthen defenses and keep auditors happy.

Live now with pre-show banter with @mzbat.bsky.social (Kimber) and @antisyphontraining.bsky.social.

Close Security Gaps, Pass Audits, Stay Secure w/ Kimber Amos and @redsiege.com
www.antisyphontraining.com/event/anti-c...

6 months ago 1 0 0 0
Advertisement

I desperately want to know how long it took the bad guys to crack it. My intel/rumor mill says it took at least a week (or more). If that were the case, my guess is pen testers wouldn't have cracked it, so it is just an informational finding in the report.

6 months ago 3 0 2 0

I think about this often.
What is a real world bad guy's level of effort for cracking?
How long do they spend?
How big is their cracker?
Do they have multiple crackers?
How do they distribute the load?

6 months ago 6 1 1 0

If it was in the report, then that's a really bad look.
Of course, this assumes they had pen test and the pen testers successfully cracked it.

6 months ago 0 0 0 0
Green Day - Wake Me Up When September Ends (Official Audio)
Green Day - Wake Me Up When September Ends (Official Audio) YouTube video by Green Day

BRB, going to wake up Billie Joe.
www.youtube.com/watch?v=pGhw...

6 months ago 2 0 0 0

Join me next week on the Thursday Defensive (thursdef.com) next Thursday at 1:30 ET on Offensive for Defense - How defenders can use offensive tools to test themselves.

6 months ago 2 0 0 0

Couldn't agree more. How many high/crit PHP findings in your vuln scan reports that are meaningless because that function isn't used (or used with user input). Teams work hard remediate issues that have 0 impact, largely because it shows up in a dashboard, metrics, or KPIs... not because it matters.

6 months ago 6 0 0 0

Really cool to be interviewed and quoted in this article.

7 months ago 3 0 0 0
Advertisement

So by proxy, RC4 with Kerberos is bad.

7 months ago 2 1 0 0

RC4 used with Kerberos isn't the fundemental flaw we think. Yes, RC4 is deprecated, but the real issue is the key generation for AES v RC4 for cracking (Kerberoasting). With RC4 the key = password hash. With AES it is 4096 rounds of hashing of hash+username+domain. The 4096 rounds matters, a lot!

7 months ago 7 2 1 0

I'm looking forward to @wildwesthackinfest.bsky.social. I also have a Kerberos workshop there, so check that out.
Oh, and we'll have tons of swag at the @redsiege.com booth, so stop by if you're in-person!

7 months ago 4 2 0 0