Hang Fire: Challenging our Mental Model of Initial Access | by Matt Hand
https://posts.specterops.io/hang-fire-challenging-our-mental-model-of-initial-access-513c71878767
https://posts.specterops.io/hang-fire-challenging-our-mental-model-of-initial-access-513c71878767
Medium
Hang Fire: Challenging our Mental Model of Initial Access
For as long as I’ve been working in security, initial access has generally looked the same. While there are high degrees of variation…
Dealing with Failure: Failure Escalation Policy in CLR Hosts
https://posts.specterops.io/dealing-with-failure-failure-escalation-policy-in-clr-hosts-54ca8b728faa
https://posts.specterops.io/dealing-with-failure-failure-escalation-policy-in-clr-hosts-54ca8b728faa
Medium
Dealing with Failure: Failure Escalation Policy in CLR Hosts
Offensive tooling built upon the .NET framework and its runtime environment, the Common Language Runtime (CLR), is an important part of…
On Detection: Tactical to Functional
Part 2: Operations
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Part 2: Operations
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Medium
Part 2: Operations
Welcome back to my On Detection: Tactical to Functional series. In the first post in this series, we explored the source code for Mimikatz’s sekurlsa::logonPasswords command. We discovered that…
On Detection: Tactical to Functional
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Medium
Part 2: Operations
Welcome back to my On Detection: Tactical to Functional series. In the first post in this series, we explored the source code for Mimikatz’s sekurlsa::logonPasswords command. We discovered that…
Prioritization of the Detection Engineering Backlog
https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981
https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981
Medium
Prioritization of the Detection Engineering Backlog
Written by Joshua Prager and Emily Leidy
Uncovering Window Security Events
Part 1: TelemetrySource
https://posts.specterops.io/uncovering-window-security-events-ab72e1ec745c
Part 1: TelemetrySource
https://posts.specterops.io/uncovering-window-security-events-ab72e1ec745c
Medium
Uncovering Windows Events
Part 1: TelemetrySource