@eitot8 Profile picture

eitot

@eitot8

Co-Founder & Principal Consultant @ Tier Zero Security (https://t.co/nat3BNrqQn)

Similar User
Jonathan Shephard photo

@shephajona

Tomais photo

@softpoison_

NileshK photo

@NileshPisces

@NZSmartie@cloudisland.nz photo

@NZSmartie

Lostboy photo

@LostBoyNZ

Claudio Contin photo

@claudiocontin

phish 🐟 photo

@dunderhay

securityfu photo

@securityfu

eitot Reposted

Need some persistence but don't want to make it super obvious? Calling Get-MpPreference from Powershell will try to load wbemprox.dll via COM.🤪So even a sheduled task calling powershell with this function will trigger your C2 connection.

Tweet Image 1
Tweet Image 2

🛑 5 Common Windows Settings That Leave Your Organisation Vulnerable 🛑 Apart from ADCS HTTP Enrollment, they are all default settings. That’s probably why we keep seeing similar setup 😬

Tweet Image 1

eitot Reposted

Who’s the real #GrimResource? Spoiler: It’s us! 😏 Here's our latest blog on using MSC files for initial access: outflank.nl/blog/2024/08/1… Fun fact: @elastic’s post on this technique came from a sample caught by a blue team, originally used by a red team through our OST offering.

Tweet Image 1

eitot Reposted

From Domain User to Global Admin. A real example from a real environment. We found this path with free and open source BloodHound Community Edition: medium.com/p/335652a164df

Tweet Image 1

I've created a PoC for network-based EDR telemetry filtering. We'll try to release a blog on Tier Zero Security Ltd website early next week :) 🛑 ARP Spoofing and Network Filtering to Block EDR Telemetry 🛑 youtu.be/Uyx4nsjupnE?si…


I was working on the lateral movement kill-chain from on-premises AD to Microsoft Entra ID when I discovered a new offering from Microsoft called "Microsoft Entra Cloud Sync” and we decided to take a closer look tierzerosecurity.co.nz/2024/05/21/ms-…


eitot Reposted

Had a go with the KexecDD exploit recently release and wrote a quick post about it: tierzerosecurity.co.nz/2024/04/29/kex… link to the original exploit: github.com/floesen/KExecDD

Tweet Image 1

eitot Reposted

LSA Whisperer focuses on interacting with Authentication Packages using their individual message protocols. Read @mcbroom_evan's NEW blog post detailing the journey developing the project to learn more. ⬇️ ghst.ly/3Q64iGa


eitot Reposted

Top 9 Hacking Gadgets and Their Uses 👇

Tweet Image 1

eitot Reposted

Been playing with steganography for shellcode loaders and had some interesting results. You can read more at: tierzerosecurity.co.nz/2024/04/03/ste…


I was working on a blog about Sysmon implementation and now I’m abusing it. A typical gemini behavior. #redteam #blueteam #blindedr #edr #sysmon tierzerosecurity.co.nz/2024/03/27/bli…


eitot Reposted

TierZeroSecurity latest blog. @eitot8 explains how to abuse MiniFilter Altitude to blind EDR tierzerosecurity.co.nz/2024/03/27/bli…


eitot Reposted

I wrote a simple post on automation of evasion and compilation of C# tools tierzerosecurity.co.nz/2024/03/03/tea…


eitot Reposted

😈 Bypassing EDRs With EDR-Preloading @MalwareTechBlog describes “EDR-Preloading,” which involves running malicious code before the EDR’s DLL is loaded into the process, enabling you to prevent it from running at all 🛠️ PoC: github.com/MalwareTech/ED… malwaretech.com/2024/02/bypass…


United States Trends
Loading...

Something went wrong.


Something went wrong.