Twitter | Search | |
Eric Smith
Consultant, Therapist. Persistent SoB. I don't like to lose. Your systems sure do look appetizing.
3,531
Tweets
753
Following
3,783
Followers
Tweets
Eric Smith retweeted
Rick McElroy Jun 20
Awesome gets even better.. I've been owned by team a couple of times and while it doesn't initially feel good neither does great medicine.. If you want everyone on your team to get smarter about talk to them
Reply Retweet Like
Eric Smith retweeted
Lares Jun 20
We couldn't be more proud to welcome the newest member of the team . As we grow, we reaffirm our commitment to making the industry better every day. Who better to challenge status quo?
Reply Retweet Like
Eric Smith retweeted
Chris Nickerson Jun 20
We couldn't be more proud to welcome the newest member of the team . As we grow, we reaffirm our commitment to making the industry better every day. Who better to challenge status quo?
Reply Retweet Like
Eric Smith retweeted
BruCON Jun 14
We couldn't imagine a BruCON without ! Whether you want to analyse or create your own malicious documents, this course is for you !
Reply Retweet Like
Eric Smith retweeted
Nicolas Krassas Jun 14
Takeover - SubDomain TakeOver Vulnerability Scanner
Reply Retweet Like
Eric Smith retweeted
DirectoryRanger Jun 13
Invoke-ADLabDeployer. Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams
Reply Retweet Like
Eric Smith retweeted
L0pht Jun 6
“The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask)” has been accepted by the CFP! See you in Vegas!
Reply Retweet Like
Eric Smith Jun 2
Replying to @Nolan_Garrett
Agree, and every vuln scanner finds diff issues than the next. Half the time they are using default or trimmed down scan policies which taints the results worse.
Reply Retweet Like
Eric Smith retweeted
highwiz May 30
Even if your talk ended up getting rejected from the CFP this year, be proud of the fact that you had the courage try... And I hope next year, you'll try again.
Reply Retweet Like
Eric Smith retweeted
Bassnectar Jun 1
Gearing up for our 3 night gathering in Colorado 🧡 much love to Lia & Chris
Reply Retweet Like
Eric Smith retweeted
Kenna Security Jun 1
Kenna Security researchers disclose misconfiguration in google groups resulting in 3000+ organizations leaking sensitive email content. Check out the latest post from via
Reply Retweet Like
Eric Smith retweeted
Luke McOmie Jun 1
Going to DEF CON? Then why aren't you throwing a big ass party?!? We (the Party Goons) are standing to help you throw the party everybody will be talking about. We have the resources, experience, and Vegas...
Reply Retweet Like
Eric Smith Jun 2
If your "pen testers" are charging you for scan time, it was broken before it started.
Reply Retweet Like
Eric Smith retweeted
Jess Jun 1
Reply Retweet Like
Eric Smith Jun 2
Replying to @J3ssa @theKos and 3 others
We love having you on the team!!
Reply Retweet Like
Eric Smith retweeted
Casey Smith May 18
DotNetToJScript is the amazing work of & It gives us all a public example of a WSH escape. There are others. They are not public. This helps demonstrate the ability for adversaries to run arbitrary code inside WSH. Check it out. Study it.
Reply Retweet Like
Eric Smith retweeted
c0d3inj3cT May 18
Interesting DLL Hijacking technique using .URL files. 1. Create a .URL file. 2. URL = path to application 3. WorkingDirectory = path to SMB Share hosting the DLL The DLL will be downloaded over SMB, loaded and executed.
Reply Retweet Like
Eric Smith retweeted
Chris Wysopal May 19
20 years ago today 7 hackers from the L0pht testified about cyber security on Capitol Hill. & will return on 5/22/18 to discuss what has improved what hasn’t.
Reply Retweet Like
Eric Smith retweeted
Nicolas Krassas May 18
FireShodanMap - A Realtime Map That Integrates Firebase, Google Maps And Shodan
Reply Retweet Like
Eric Smith retweeted
Chris Eng May 22
"It took the industry years to come to terms with outsiders poking holes in their systems."
Reply Retweet Like