Personal Information
Organization / Workplace
Greater Seattle Area United States
Occupation
Offensive Engineer
Industry
Consulting / Advisory
Website
http://blog.harmj0y.net
About
Will is an offensive engineer/red teamer and performs a variety of offensive services including red team engagements and offensive tool development. He is a co-founder of the Veil-Framework, Empire/EmPyre, and BloodHound, developed PowerView and PowerUp, and is an active developer on the PowerSploit project. He is also a Microsoft PowerShell/CDM MVP.
He has presented at a number of security conferences including ShmooCon, DEF CON, Derbycon, Troopers, BlueHat Israel, and several Security BSides conferences on topics spanning AV-evasion, post-exploitation, red team tradecraft, and offensive PowerShell.
Tags
powershell
active directory
psconfeu
powerview
kerberos
kerberoasting
information security
empire
user-hunting
red-teaming
veil-framework
data
hacking
adcs
ad cs
specterops
sp4rkcon
keepass
bloodhound
powershell empire
domain trusts
empyre
python
troopers
carolinacon
post-exploitation
av-evasion
veil-evasion
privesc
cortana
attack scripting
metasploit
See more
Presentations
(32)Likes
(2)Passwords#14 - mimikatz
Benjamin Delpy
•
9 years ago
Abusing Microsoft Kerberos - Sorry you guys don't get it
Benjamin Delpy
•
9 years ago
Personal Information
Organization / Workplace
Greater Seattle Area United States
Occupation
Offensive Engineer
Industry
Consulting / Advisory
Website
http://blog.harmj0y.net
About
Will is an offensive engineer/red teamer and performs a variety of offensive services including red team engagements and offensive tool development. He is a co-founder of the Veil-Framework, Empire/EmPyre, and BloodHound, developed PowerView and PowerUp, and is an active developer on the PowerSploit project. He is also a Microsoft PowerShell/CDM MVP.
He has presented at a number of security conferences including ShmooCon, DEF CON, Derbycon, Troopers, BlueHat Israel, and several Security BSides conferences on topics spanning AV-evasion, post-exploitation, red team tradecraft, and offensive PowerShell.
Tags
powershell
active directory
psconfeu
powerview
kerberos
kerberoasting
information security
empire
user-hunting
red-teaming
veil-framework
data
hacking
adcs
ad cs
specterops
sp4rkcon
keepass
bloodhound
powershell empire
domain trusts
empyre
python
troopers
carolinacon
post-exploitation
av-evasion
veil-evasion
privesc
cortana
attack scripting
metasploit
See more