Offensive Security Guide to SSH Tunnels and Proxies | by Russel Van Tuyl
https://posts.specterops.io/offensive-security-guide-to-ssh-tunnels-and-proxies-b525cbd4d4c6
https://posts.specterops.io/offensive-security-guide-to-ssh-tunnels-and-proxies-b525cbd4d4c6
SpecterOps
Blog - SpecterOps
Your new best friend: Introducing BloodHound Community Edition!
US SpecterOps to buff up Australian spymasters' cybersecurity skills
https://www.intelligenceonline.com/surveillance--interception/2021/05/06/us-specterops-to-buff-up-australian-spymasters--cybersecurity-skills,109663701-ar1
https://www.intelligenceonline.com/surveillance--interception/2021/05/06/us-specterops-to-buff-up-australian-spymasters--cybersecurity-skills,109663701-ar1
Intelligence Online
AUSTRALIA : US SpecterOps to buff up Australian spymasters' cybersecurity skills - 06/05/2021 - Intelligence Online
The Australian Signals Directorate has hired American firm SpecterOps to train its agents as part of a strategy to strengthen its cyber incident response capacity. - 06/05/2021
BloodHound Enterprise vs. BloodHound Open-Source
https://posts.specterops.io/bloodhound-enterprise-vs-bloodhound-open-sourc-e4fe55594359
https://posts.specterops.io/bloodhound-enterprise-vs-bloodhound-open-sourc-e4fe55594359
Medium
BloodHound Enterprise vs. BloodHound Open-Source
As we’re continuing to approach our summer launch, many of you have asked us for a simple breakdown of BloodHound Enterprise vs BloodHound…
Certified Pre-Owned. Active Directory Certificate Services
https://posts.specterops.io/certified-pre-owned-d95910965cd2
https://posts.specterops.io/certified-pre-owned-d95910965cd2
Medium
Certified Pre-Owned
Active Directory Certificate Services has a lot of attack potential!
Shadow Credentials: Abusing Key Trust Account Mapping for Account Takeover
https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab
https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab
SpecterOps
The Renaissance of NTLM Relay Attacks: Everything You Need to Know - SpecterOps
NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive and kicking and arguably worse than ever before. Relay attacks are the easiest…
Learning from our Myths
Cody talks about the direction Mythic is going, and walks us through some of the new features coming out with the Mythic 2.2 release.
https://posts.specterops.io/learning-from-our-myths-45a19ad4d077
Cody talks about the direction Mythic is going, and walks us through some of the new features coming out with the Mythic 2.2 release.
https://posts.specterops.io/learning-from-our-myths-45a19ad4d077
Medium
Learning from our Myths
It’s been almost a year since I published A Change of Mythic Proportions where Apfell was rebranded to Mythic. Since then, a lot has…
Ghostwriter v2.2.2 releases: The SpecterOps project management and reporting engine
https://securityonline.info/ghostwriter/
https://securityonline.info/ghostwriter/
securityonline.info
Ghostwriter v4.0.1 releases: The SpecterOps project management and reporting engine
Ghostwriter is a part of your team. It helps you manage clients, projects, reports, and infrastructure in one application.
Azure Privilege Escalation via Azure API Permissions Abuse | by Andy Robbins | Dec, 2021 | Posts By SpecterOps Team Members
https://posts.specterops.io/azure-privilege-escalation-via-azure-api-permissions-abuse-74aee1006f48
https://posts.specterops.io/azure-privilege-escalation-via-azure-api-permissions-abuse-74aee1006f48
SpecterOps
Blog - SpecterOps
Your new best friend: Introducing BloodHound Community Edition!