Tim Medin's Avatar

Tim Medin

@timmedin.bsky.social

Kerberoast Guy • RedSiege CEO • Hater of Pants • Former SANS 560 Author, Senior Instructor • Packers owner • Work Req: http://redsiege.com/contact

1,482 Followers  |  778 Following  |  296 Posts  |  Joined: 24.05.2023
Posts Following

Posts by Tim Medin (@timmedin.bsky.social)

Post image

I decided to chat with a spammer/scammer. I found them to be pretty honest and forthcoming.

06.01.2026 16:28 — 👍 4    🔁 0    💬 1    📌 0

Apple's Liquid Glass was cool for like 1 minute.

06.01.2026 16:21 — 👍 0    🔁 0    💬 1    📌 0

I have debated declaring email bankruptcy many times. Haven't done it... yet.

12.12.2025 16:15 — 👍 3    🔁 0    💬 0    📌 0

My "Death by Dashboards" talk from WWHF is up!

11.12.2025 17:32 — 👍 2    🔁 2    💬 0    📌 0
Post image

Months of battling, and I won. Inbox zero.
... for now.

11.12.2025 17:31 — 👍 3    🔁 0    💬 1    📌 0

Microsoft created Get-KerbEncryptionUsage.ps1 (see link in article) to query the event log to see which encryption types Kerberos used within your environment.
Run this, find the ones that MUST use RC4, and burn the rest. Then figure out how to upgrade the others from RC4 or pick a great password.

10.12.2025 18:06 — 👍 2    🔁 0    💬 0    📌 0

The ones here are obnoxious. But there’s a charm about Wisconsin alcoholics that Minnesota alcoholics just don’t have.

29.11.2025 22:18 — 👍 4    🔁 1    💬 0    📌 0

I can't spell that stupid word correctly... ever

10.12.2025 18:02 — 👍 2    🔁 0    💬 0    📌 0
Preview
Beyond RC4 for Windows authentication As organizations face an evolving threat landscape, strengthening Windows authentication is more critical than ever.

"By mid-2026, ... Windows Server 2008 and later to only allow AES-SHA1 encryption. RC4 will be disabled by default and only used if a domain administrator explicitly configures an account or the KDC to use it."
www.microsoft.com/en-us/window...

10.12.2025 17:54 — 👍 0    🔁 0    💬 0    📌 1
Post image

I love WI airports.
Concourse beers are not only legal, but it’s encouraged with signs all over the airport.

29.11.2025 21:49 — 👍 9    🔁 0    💬 2    📌 0

“Killer” lol
So bad. ;)

18.11.2025 22:59 — 👍 4    🔁 0    💬 1    📌 0
Post image

I'm home after teaching Offense for Defense at NineStart Connect. They offered free (yes, free) training to whomever wanted to attend. I can't thank them enough for offering this to our community!

The class is available here: training.redsiege.com (affordable, not free... sorry you missed out 😉)

14.11.2025 15:03 — 👍 4    🔁 0    💬 0    📌 0
Post image

Wrapping up @defcon.bsky.social Bahrain at the ICS Village.
Not my best picture, but excellent photo bomb.

06.11.2025 12:01 — 👍 7    🔁 0    💬 0    📌 0
Post image

Damn.
I’m never going to find this room.

24.10.2025 23:14 — 👍 282    🔁 41    💬 10    📌 1

Two days of teaching Pen Testing: Beyond the Basics ✅
Two hour Kerberos workshop ✅
Talk ✅
Tomorrow, time to be a full time booth babe.

10.10.2025 00:17 — 👍 8    🔁 0    💬 0    📌 0
Post image

Last year at @wildwesthackinfest.bsky.social a few packages arrived late (not mine). The maintenance staff regularly receives packages and thought it was theirs. They opened it, found a pack of stickers.
They have been putting them on their stuff and the hotel.
"We wondered who that guy was"

09.10.2025 21:24 — 👍 4    🔁 1    💬 1    📌 0
Post image

Senior Security Consultant Justin Palk tells you everything you need to know about getting started with proxy chains in this blog 🔗 redsiege.com/proxychains

#hacking #infosec #cybersecurity

09.10.2025 13:54 — 👍 1    🔁 1    💬 0    📌 0

The booth is hopping! Stop by to get tons of stickers, a shirt, and get entered to win a framed autographed picture from Hackers.

09.10.2025 19:23 — 👍 1    🔁 0    💬 0    📌 0

Join us tomorrow!

01.10.2025 17:36 — 👍 0    🔁 0    💬 0    📌 0
Preview
Anti-Cast: Close Security Gaps, Pass Audits, Stay Secure with Kimber Amos - Antisyphon Training Join Kimber Amos for a free one-hour training on cutting through compliance theater and running reviews that actually strengthen defenses and keep auditors happy.

Live now with pre-show banter with @mzbat.bsky.social (Kimber) and @antisyphontraining.bsky.social.

Close Security Gaps, Pass Audits, Stay Secure w/ Kimber Amos and @redsiege.com
www.antisyphontraining.com/event/anti-c...

01.10.2025 15:38 — 👍 1    🔁 0    💬 0    📌 0

I desperately want to know how long it took the bad guys to crack it. My intel/rumor mill says it took at least a week (or more). If that were the case, my guess is pen testers wouldn't have cracked it, so it is just an informational finding in the report.

30.09.2025 14:20 — 👍 3    🔁 0    💬 2    📌 0

I think about this often.
What is a real world bad guy's level of effort for cracking?
How long do they spend?
How big is their cracker?
Do they have multiple crackers?
How do they distribute the load?

30.09.2025 14:18 — 👍 6    🔁 1    💬 1    📌 0

If it was in the report, then that's a really bad look.
Of course, this assumes they had pen test and the pen testers successfully cracked it.

30.09.2025 14:15 — 👍 0    🔁 0    💬 0    📌 0
Green Day - Wake Me Up When September Ends (Official Audio)
YouTube video by Green Day Green Day - Wake Me Up When September Ends (Official Audio)

BRB, going to wake up Billie Joe.
www.youtube.com/watch?v=pGhw...

30.09.2025 14:05 — 👍 2    🔁 0    💬 0    📌 0

Join me next week on the Thursday Defensive (thursdef.com) next Thursday at 1:30 ET on Offensive for Defense - How defenders can use offensive tools to test themselves.

26.09.2025 17:03 — 👍 2    🔁 0    💬 0    📌 0

Couldn't agree more. How many high/crit PHP findings in your vuln scan reports that are meaningless because that function isn't used (or used with user input). Teams work hard remediate issues that have 0 impact, largely because it shows up in a dashboard, metrics, or KPIs... not because it matters.

24.09.2025 16:45 — 👍 6    🔁 0    💬 0    📌 0

Really cool to be interviewed and quoted in this article.

18.09.2025 18:57 — 👍 4    🔁 0    💬 0    📌 0

So by proxy, RC4 with Kerberos is bad.

16.09.2025 17:17 — 👍 2    🔁 1    💬 0    📌 0

RC4 used with Kerberos isn't the fundemental flaw we think. Yes, RC4 is deprecated, but the real issue is the key generation for AES v RC4 for cracking (Kerberoasting). With RC4 the key = password hash. With AES it is 4096 rounds of hashing of hash+username+domain. The 4096 rounds matters, a lot!

16.09.2025 17:14 — 👍 8    🔁 2    💬 1    📌 0

I'm looking forward to @wildwesthackinfest.bsky.social. I also have a Kerberos workshop there, so check that out.
Oh, and we'll have tons of swag at the @redsiege.com booth, so stop by if you're in-person!

12.09.2025 17:02 — 👍 4    🔁 2    💬 0    📌 0