Dealing with Failure: Failure Escalation Policy in CLR Hosts
https://posts.specterops.io/dealing-with-failure-failure-escalation-policy-in-clr-hosts-54ca8b728faa
https://posts.specterops.io/dealing-with-failure-failure-escalation-policy-in-clr-hosts-54ca8b728faa
Medium
Dealing with Failure: Failure Escalation Policy in CLR Hosts
Offensive tooling built upon the .NET framework and its runtime environment, the Common Language Runtime (CLR), is an important part of…
On Detection: Tactical to Functional
Part 2: Operations
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Part 2: Operations
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Medium
Part 2: Operations
Welcome back to my On Detection: Tactical to Functional series. In the first post in this series, we explored the source code for Mimikatz’s sekurlsa::logonPasswords command. We discovered that…
On Detection: Tactical to Functional
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Medium
Part 2: Operations
Welcome back to my On Detection: Tactical to Functional series. In the first post in this series, we explored the source code for Mimikatz’s sekurlsa::logonPasswords command. We discovered that…
Prioritization of the Detection Engineering Backlog
https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981
https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981
Medium
Prioritization of the Detection Engineering Backlog
Written by Joshua Prager and Emily Leidy
The Defender’s Guide to the Windows Registry
https://posts.specterops.io/the-defenders-guide-to-the-windows-registry-febe241abc75
https://posts.specterops.io/the-defenders-guide-to-the-windows-registry-febe241abc75
SpecterOps
The Defender’s Guide to the Windows Registry - SpecterOps
This is a series of blog posts designed to give you a ground-up start to defending a specific technology from potential attackers.
Uncovering Window Security Events
Part 1: TelemetrySource
https://posts.specterops.io/uncovering-window-security-events-ab72e1ec745c
Part 1: TelemetrySource
https://posts.specterops.io/uncovering-window-security-events-ab72e1ec745c
Medium
Uncovering Windows Events
Part 1: TelemetrySource
Stalking inside of your Chromium Browser
https://posts.specterops.io/stalking-inside-of-your-chromium-browser-757848b67949
https://posts.specterops.io/stalking-inside-of-your-chromium-browser-757848b67949
Medium
Stalking inside of your Chromium Browser
Stalking inside of your Chromium Browser Revisiting Remote Debugging Okay, you got your favorite agent running on the target machine. You did a process listing, but nothing interesting popped out …