Andrew Profile
Andrew

@4ndr3w6S

Followers
2K
Following
8K
Statuses
999

Senior Manager of Detection Engineering @HuntressLabs | Prev. Practice Lead, TAC (Purple Team) @TrustedSec | @SpursOfficial Super Fan - COYS!

Joined April 2017
Don't wanna be here? Send us removal request.
@4ndr3w6S
Andrew
2 years
Domain Controllers are not PAWs. Please DO NOT USE your Domain Controllers as โ€œjump boxesโ€ to other systems.
49
29
289
@4ndr3w6S
Andrew
19 days
Incredibly excited to share my first blog with @HuntressLabs ๐Ÿš€ I explore detecting Kerberoasting attacks using Perfmon as a data sourceโ€”highlighting the rich metadata in Perfmon counters and their potential for enhancing detections. ๐Ÿ˜ˆ Check it out:
3
31
146
@4ndr3w6S
Andrew
26 days
RT @nas_bench: Happy Friday ๐Ÿ˜
Tweet media one
0
4
0
@4ndr3w6S
Andrew
27 days
RT @M_haggis: ๐Ÿ’™๐Ÿ’œโค๏ธ
Tweet media one
0
7
0
@4ndr3w6S
Andrew
28 days
๐ŸŒถ๏ธ๐ŸŒถ๏ธ๐ŸŒถ๏ธ๐Ÿ˜ˆ
Tweet media one
@rad9800
Rad
28 days
For those unable to get their hands on EDR software for reversing, TrendMicro kindly publishes their resources at It's possible to download and extract the on-prem appliance and explore to understand how EDRs (if you can even call it that) work.
Tweet media one
2
10
82
@4ndr3w6S
Andrew
2 months
0
0
0
@4ndr3w6S
Andrew
2 months
Reading a report that only has Active Directory based attacksโ€ฆoh wait ๐Ÿ™ƒ ๐ŸŒถ๏ธ๐Ÿ˜ˆ
@0xTib3rius
Tib3rius
2 months
What's purple team? Wrong answers only.
0
0
2
@4ndr3w6S
Andrew
2 months
@jamieantisocial @jsecurity101 ๐Ÿ‘€๐Ÿ‘€๐Ÿ‘€๐Ÿ’œ
1
0
3
@4ndr3w6S
Andrew
2 months
This is a prime example of reading/learning code + learning internals (with rinse and repeat) ๐Ÿฆพ Fantastic read and writeup! ๐Ÿ”ฅ
@falconforceteam
FalconForce Official
2 months
Join @olafhartong in his journey down the rabbit hole in search of new detection opportunities in the #Zeek telemetry embedded in Microsoft's EDR #MDE! Detection engineering is sometimes hard โ€ฆ ๐Ÿ˜Ž #detectionengineering #kql #blueteam
Tweet media one
1
1
11
@4ndr3w6S
Andrew
2 months
Amazing work by my awesome colleagues @HuntressLabs ๐Ÿ”ฅ Check it out below, for the details on Cleo (CVE-2024-50623) ๐Ÿ‘‡
0
0
6
@4ndr3w6S
Andrew
2 months
@N7WEra @odiesec @Octoberfest73 @exploitph and I identified many of the flag differences 2 years ago, and baked them into our tool:
1
0
2
@4ndr3w6S
Andrew
3 months
LOL sorry @gentilkiwi ๐Ÿ˜‚๐Ÿ˜…
Tweet media one
@lsecqt
Lsec
3 months
๐Ÿš€ Exciting update for Haunt: it can now execute C# assemblies directly from memory! ๐Ÿ›ก๏ธ Enhancing covert operations and expanding capabilities. Huge thanks to my incredible Patreons for making this possible!
Tweet media one
2
1
7
@4ndr3w6S
Andrew
3 months
@_RastaMouse Not even I canโ€™t download โ€œbecause a virus has been detected.โ€ ๐Ÿ˜‚๐Ÿ˜…
0
0
1
@4ndr3w6S
Andrew
3 months
@techspence Burning tradecraft to phish your way in, only to realize you actually are in a pure Mac environment and there is no Active Directory ๐Ÿ˜‚
1
0
5
@4ndr3w6S
Andrew
3 months
@cyberGoatPsyOps Looking great buddy ๐Ÿฆพ
0
0
1
@4ndr3w6S
Andrew
3 months
@Bandrel Congrats @Bandrel, @slobtresix0 and @LouScicchitano! Much deserved ๐ŸŽ‰
0
0
3
@4ndr3w6S
Andrew
3 months
0
0
0
@4ndr3w6S
Andrew
3 months
Learning to code + Learning internals = ๐Ÿ’œ
@Octoberfest73
Octoberfest7
3 months
There are some interesting detections for U2U/UnPAC the hash in certipy/rubues/mimiktaz/impacket based on TGS ticket options (. Did some tinkering and by removing a few flags you can shake detection while still recovering the NT hash from a TGT
Tweet media one
0
0
7