An Introduction to Manual Active Directory Querying with Dsquery and Ldapsearch
https://posts.specterops.io/an-introduction-to-manual-active-directory-querying-with-dsquery-and-ldapsearch-84943c13d7eb
https://posts.specterops.io/an-introduction-to-manual-active-directory-querying-with-dsquery-and-ldapsearch-84943c13d7eb
SpecterOps
Introduction to Manual Active Directory Querying | SpecterOps
Learn to perform manual Active Directory queries with dsquery and ldapsearch. Master basic commands to efficiently navigate AD environments.
Relaying NTLM Authentication from SCCM Clients
https://posts.specterops.io/relaying-ntlm-authentication-from-sccm-clients-7dccb8f92867
https://posts.specterops.io/relaying-ntlm-authentication-from-sccm-clients-7dccb8f92867
Medium
Relaying NTLM Authentication from SCCM Clients
tl;dr: Seriously, please disable NTLM
Hang Fire: Challenging our Mental Model of Initial Access | by Matt Hand
https://posts.specterops.io/hang-fire-challenging-our-mental-model-of-initial-access-513c71878767
https://posts.specterops.io/hang-fire-challenging-our-mental-model-of-initial-access-513c71878767
Medium
Hang Fire: Challenging our Mental Model of Initial Access
For as long as I’ve been working in security, initial access has generally looked the same. While there are high degrees of variation…
Dealing with Failure: Failure Escalation Policy in CLR Hosts
https://posts.specterops.io/dealing-with-failure-failure-escalation-policy-in-clr-hosts-54ca8b728faa
https://posts.specterops.io/dealing-with-failure-failure-escalation-policy-in-clr-hosts-54ca8b728faa
Medium
Dealing with Failure: Failure Escalation Policy in CLR Hosts
Offensive tooling built upon the .NET framework and its runtime environment, the Common Language Runtime (CLR), is an important part of…
On Detection: Tactical to Functional
Part 2: Operations
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Part 2: Operations
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Medium
Part 2: Operations
Welcome back to my On Detection: Tactical to Functional series. In the first post in this series, we explored the source code for Mimikatz’s sekurlsa::logonPasswords command. We discovered that…
On Detection: Tactical to Functional
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Medium
Part 2: Operations
Welcome back to my On Detection: Tactical to Functional series. In the first post in this series, we explored the source code for Mimikatz’s sekurlsa::logonPasswords command. We discovered that…
Prioritization of the Detection Engineering Backlog
https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981
https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981
Medium
Prioritization of the Detection Engineering Backlog
Written by Joshua Prager and Emily Leidy