
Chris Thompson
@_Mayyhem
Followers
2K
Following
2K
Media
14
Statuses
431
Senior Security Researcher @SpecterOps https://t.co/Sz5fRYkX6u
Joined August 2015
RT @subat0mik: Thanks to everyone who attended our (@unsigned_sh0rt) talk at @WEareTROOPERS! Here is the companion blog post: https://t.c….
0
22
0
RT @HackAndDo: I'm not sure everyone realizes it, but as it stands, if you have an Active Directory with default configurations, any machin….
0
101
0
RT @_xpn_: So excited to see this one come out! Awesome post from @n0pe_sled on why IdP's should still be scrutinized! (tl;dr: OneLogin le….
0
46
0
RT @SpecterOps: BadSuccessor is a new AD attack primitive that abuses dMSAs, allowing an attacker who can modify or create a dMSA to escala….
0
105
0
RT @_logangoins: I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum o….
0
168
0
RT @Oddvarmoe: Your #MDT shares might be spilling secrets like a drunk uncle at a wedding. 🍷💬. In my latest post for @TrustedSec, I dig int….
0
33
0
The video of @unsigned_sh0rt's and my talk at @SpecterOps's SO-CON with step-by-step guidance on how to mitigate SCCM hierarchy takeover and credential theft attacks is up!. Video: Slides: More info:
0
10
45
RT @_logangoins: I jumped heavily into learning about SCCM tradecraft and wrote a detailed write-up with custom examples, covering the most….
0
132
0
RT @unsigned_sh0rt: Had some fun with PDQ deploy/inventory credential decryption and wrote about it here: thanks to….
0
44
0
RT @SpecterOps: Think NTLM relay is a solved problem? Think again. Relay attacks are more complicated than many people realize. Check out….
0
95
0
RT @SpecterOps: New blog post just dropped! 🙌. Read the latest from @Tw1sm on how an operator can perform situational awareness steps prior….
0
50
0
Had a great time speaking with @unsigned_sh0rt about SCCM attack path prevention at SO-CON yesterday! Our slides with step-by-step instructions for mitigating the most critical SCCM attacks in your environment are at
Join @_Mayyhem & @unsigned_sh0rt as their talk gets underway at #SOCON2025! They are demonstrating common misconfiguration abuses & attack paths in SCCM along with a step-by-step remediation guidance.
0
24
71
I'm excited that my first PRs to BloodHound/SharpHound are now in main! They remove FPs for Owns/WriteOwner edges when implicit owner rights are blocked and add OwnsLimitedRights and WriteOwnerLimitedRights edges when ACEs grant permissions to the OWNER RIGHTS SID. More to come!.
Accurately see what permissions are exploitable in your AD environment. @_Mayyhem discusses a recent update in BloodHound that shows fewer false positives for Owns/WriteOwner edges, & introduces the new Owns/WriteOwnerLimitedRights edges. ⬇️
1
17
78
RT @unsigned_sh0rt: Along with this blog, I published an update to SCCMHunter that enables credential recovery all from the admin module. N….
0
55
0
Still using FOSS/Legacy BloodHound for a specific use case or feature? This survey is a great opportunity to share feedback and what matters to you most when using BloodHound CE with the dev team and snag a free t-shirt while you're at it!
How does your org use #AttackPathManagement? We want to know!. Take our survey to get a free BloodHound T-shirt and also enter to win a free ticket to #SOCON2025. The deadline to be entered to win the SO-CON pass is Thursday, Feb. 6 at 11:59 PT.
1
4
15
RT @unsigned_sh0rt: Thanks to @synacktiv's recent posts about Kerberos and recent PR's @_dirkjan 's .
0
29
0
Found a .NET method on SCCM site servers that can be called to decrypt secrets stored in the site DB a while back with @unsigned_sh0rt and @tifkin_. Another alternative to @gentilkiwi's mimikatz misc::sccm, @_xpn_'s C# gist, and @sanjivkawa's SQLRecon.
0
61
173