<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: cybergreg</title><link>https://news.ycombinator.com/user?id=cybergreg</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 13 May 2026 23:33:40 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=cybergreg" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by cybergreg in "Kerberoasting"]]></title><description><![CDATA[
<p>I realize I might have been late to the party. As other comments have said, its not as easy as blaming Microsoft, though this is a popular take.</p>
]]></description><pubDate>Wed, 10 Sep 2025 13:56:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=45197770</link><dc:creator>cybergreg</dc:creator><comments>https://news.ycombinator.com/item?id=45197770</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45197770</guid></item><item><title><![CDATA[New comment by cybergreg in "Kerberoasting"]]></title><description><![CDATA[
<p>Good overview of Kerberoasting, still a common attack chain. A couple things though: To obtain access to a service, you actually need to get a service ticket (TGS) from the KDC (Domain Controller) to authenticate to the service, not a TGT. The TGT is the first ticket acquired during authentication to the domain. In addition, the "salt" is not a true salt but a concatenation of the domain and principal name, so even worse. Active Directory (invented at MIT) supports RC4, AES128, and AES256 encryption types, however you can effectively disable RC4 via Group Policy. The reason RC4 is still supported is to support legacy systems. Many organizations use old software that only supports RC4. For example, I've run into many manufacturing and small businesses that have no choice but to use it and can't upgrade the software due to $$$. Anyway, good stuff! Shout out to Tim Medin, who published this back in 2014.</p>
]]></description><pubDate>Wed, 10 Sep 2025 13:54:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=45197737</link><dc:creator>cybergreg</dc:creator><comments>https://news.ycombinator.com/item?id=45197737</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45197737</guid></item><item><title><![CDATA[New comment by cybergreg in "An attacker’s blunder gave us a look into their operations"]]></title><description><![CDATA[
<p>Again, threat actors are well aware of what they’re downloading. FWIW I’m an offsec specialist. I spend a lot of time bypassing EDR. Im just shocked at how little this crowd is aware of OpSec and threat intel. I’ll crawl back into my Reddit hole</p>
]]></description><pubDate>Wed, 10 Sep 2025 00:00:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=45191259</link><dc:creator>cybergreg</dc:creator><comments>https://news.ycombinator.com/item?id=45191259</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45191259</guid></item><item><title><![CDATA[New comment by cybergreg in "An attacker’s blunder gave us a look into their operations"]]></title><description><![CDATA[
<p>Threat intelligence is a thing.in fact there’s entire companies that sell just that. In fact, there’s entire government organizations that do just that.</p>
]]></description><pubDate>Tue, 09 Sep 2025 23:55:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=45191211</link><dc:creator>cybergreg</dc:creator><comments>https://news.ycombinator.com/item?id=45191211</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45191211</guid></item><item><title><![CDATA[New comment by cybergreg in "An attacker’s blunder gave us a look into their operations"]]></title><description><![CDATA[
<p>Huh? Small and medium sized businesses have how much to spend on security? Let alone IT?</p>
]]></description><pubDate>Tue, 09 Sep 2025 23:50:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=45191157</link><dc:creator>cybergreg</dc:creator><comments>https://news.ycombinator.com/item?id=45191157</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45191157</guid></item><item><title><![CDATA[New comment by cybergreg in "An attacker’s blunder gave us a look into their operations"]]></title><description><![CDATA[
<p>In the US, on a corporate owned device there is no expectation of privacy.</p>
]]></description><pubDate>Tue, 09 Sep 2025 18:44:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=45186666</link><dc:creator>cybergreg</dc:creator><comments>https://news.ycombinator.com/item?id=45186666</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45186666</guid></item><item><title><![CDATA[New comment by cybergreg in "An attacker’s blunder gave us a look into their operations"]]></title><description><![CDATA[
<p>Huntress is a cybersecurity company. They’re specifically hired for this purpose, to protect the company and its assets.<p>As far as unique identifiers go, advertisers use a unique fingerprint of your browser to target you individually. Cookies, JavaScript, screen size, etc, are all used.</p>
]]></description><pubDate>Tue, 09 Sep 2025 18:43:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=45186646</link><dc:creator>cybergreg</dc:creator><comments>https://news.ycombinator.com/item?id=45186646</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45186646</guid></item><item><title><![CDATA[New comment by cybergreg in "An attacker’s blunder gave us a look into their operations"]]></title><description><![CDATA[
<p>You’re really missing the point here. Huntress is an MDR, a cybersecurity company. They protect the endpoint by monitoring it for malicious activity and responding in kind. It’s what they do, not unlike Crowdstrike, Microsoft, etc. Generally a threat actor will install a security agent like this to find a bypass in order to attack more victims. They know exactly what they’re doing.</p>
]]></description><pubDate>Tue, 09 Sep 2025 18:25:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=45186274</link><dc:creator>cybergreg</dc:creator><comments>https://news.ycombinator.com/item?id=45186274</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45186274</guid></item></channel></rss>