Twitter | Search | |
Eric Smith
Consultant, Therapist. Persistent SoB. I don't like to lose. Your systems sure do look appetizing.
3,612
Tweets
780
Following
3,758
Followers
Tweets
Eric Smith retweeted
Corelan Consulting & Training Apr 23
[Blog] Windows 10 (wow64) egghunter, and (universal) SEH based egghunter for Windows: .
Reply Retweet Like
Eric Smith Apr 22
Once again, showing businesses how they should be run. You're welcome Artisan.
Reply Retweet Like
Eric Smith retweeted
DC11331 Apr 20
Socond speaker is and talk called”You (dis)liked mimikatz? Wait for Kekeo...” We start at 6PM at next Thursday 25th of April !
Reply Retweet Like
Eric Smith retweeted
Netmux Apr 15
Replying to @netmux
Reply Retweet Like
Eric Smith retweeted
Netmux Apr 15
HOW TO EXTRACT NTLM HASH FROM NTLMv1 HASH: STEP 1-Capture NTLMv1 hash with or without SSP using responder. STEP 2-Download NTLMv1-Multi tool python --nossp <ntlmv1_hash_nossp> python --ssp <ntlmv1_hash_ssp>
Reply Retweet Like
Eric Smith retweeted
c:\rusher Apr 11
I've started a blog where I will showcase my experiments with AD attacks. I've published one article about the infamous PrivExchange. Check it out!
Reply Retweet Like
Eric Smith retweeted
Damian Profancik Apr 10
We're still looking for sponsors for and CircleCityCrossroads, our one day executive summit. If you'd like more information and your company might be interested in sponsoring either event, please hit us up at sponsors@circlecitycon.com.
Reply Retweet Like
Eric Smith retweeted
DirectoryRanger Apr 10
nvoke-WMILM. PoC script for various methods to achieve authenticated remote code execution via WMI, without (at least directly) using the Win32_Process class
Reply Retweet Like
Eric Smith retweeted
netbiosX Apr 10
An intro into abusing and identifying WMI Event Subscriptions for persistence
Reply Retweet Like
Eric Smith retweeted
David Cowen Apr 10
Hey and , interested in ? Watch this video, I couldn't have said it better myself.
Reply Retweet Like
Eric Smith Apr 10
Issue here is confusion that anything offensive is now a red team. Couldn't be further from the design, mission, purpose or intent of what a red team is supposed to be.
Reply Retweet Like
Eric Smith Apr 10
Red teams should never be performing a pen test. Their objective has nothing to do with vulns or operations. This is one fundamental reason red team programs fail
Reply Retweet Like
Eric Smith retweeted
Tom Gilis Apr 7
Got to pre-test the exploit.. very nice find by ! I'm sure you will agree on Tuesday, after the patch has been released.
Reply Retweet Like
Eric Smith retweeted
⠝⠁⠃⠑⠑⠇ ⠁⠓⠍⠑⠙ Apr 8
T-Minus 1 day before details will be released Here's a little teaser of the PoC Enjoy :)
Reply Retweet Like
Eric Smith retweeted
Charles Fol Apr 8
EXPLOIT for CARPE (DIEM): CVE-2019-0211 Apache Root Privilege Escalation
Reply Retweet Like
Eric Smith retweeted
Chris Gates Apr 8
Replying to @netmux
if you already have access to the script console you can just do what I outlined here:
Reply Retweet Like
Eric Smith retweeted
National CCDC Apr 5
Reply Retweet Like
Eric Smith Apr 2
Replying to @JayInfoSec
Agree, it's prevelant in that space. Unfortunately mostly due to poorly designed and managed SOCs are the catalyst. Mature SOCs that have proper tooling and culture are awesome to work with.
Reply Retweet Like
Eric Smith Apr 2
Everything about this is incorrect. SOC is not the last line of defense. And nothing about a SOCs design or mission is unattainable. If this is how your SOC feels they need better coaching and advisement.
Reply Retweet Like
Eric Smith retweeted
Swissky 🧙‍♂️ Mar 31
Windows - Privilege Escalation Cheatsheet 🎊 Useful for OSCP and
Reply Retweet Like