On Detection: Tactical to Functional
Part 2: Operations
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Part 2: Operations
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Medium
Part 2: Operations
Welcome back to my On Detection: Tactical to Functional series. In the first post in this series, we explored the source code for Mimikatz’s sekurlsa::logonPasswords command. We discovered that…
On Detection: Tactical to Functional
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
Medium
Part 2: Operations
Welcome back to my On Detection: Tactical to Functional series. In the first post in this series, we explored the source code for Mimikatz’s sekurlsa::logonPasswords command. We discovered that…
Prioritization of the Detection Engineering Backlog
https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981
https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981
Medium
Prioritization of the Detection Engineering Backlog
Written by Joshua Prager and Emily Leidy
Uncovering Window Security Events
Part 1: TelemetrySource
https://posts.specterops.io/uncovering-window-security-events-ab72e1ec745c
Part 1: TelemetrySource
https://posts.specterops.io/uncovering-window-security-events-ab72e1ec745c
Medium
Uncovering Windows Events
Part 1: TelemetrySource
Stalking inside of your Chromium Browser
https://posts.specterops.io/stalking-inside-of-your-chromium-browser-757848b67949
https://posts.specterops.io/stalking-inside-of-your-chromium-browser-757848b67949
Medium
Stalking inside of your Chromium Browser
Stalking inside of your Chromium Browser Revisiting Remote Debugging Okay, you got your favorite agent running on the target machine. You did a process listing, but nothing interesting popped out …
Passwordless Persistence and Privilege Escalation in Azure
https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f
https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f
SpecterOps
Passwordless Persistence and Privilege Escalation in Azure - SpecterOps
How Certificate Based Authentication works, passwordless persistence with CBA, passwordless privilege escalation, prevention, detection, and more.
The Defender’s Guide to Windows Services (update)
https://posts.specterops.io/the-defenders-guide-to-windows-services-67c1711ecba7
https://posts.specterops.io/the-defenders-guide-to-windows-services-67c1711ecba7
SpecterOps
Blog - SpecterOps
Your new best friend: Introducing BloodHound Community Edition!
🔥1
At the Edge of Tier Zero: The Curious Case of the RODC
https://posts.specterops.io/at-the-edge-of-tier-zero-the-curious-case-of-the-rodc-ef5f1799ca06
https://posts.specterops.io/at-the-edge-of-tier-zero-the-curious-case-of-the-rodc-ef5f1799ca06
SpecterOps
At the Edge of Tier Zero: The Curious Case of the RODC - SpecterOps
In this blog post, we’ll answer the question, “If I compromise a Read-Only Domain Controller, can I compromise the domain?” or, “Do RODCs belong in Tier Zero?”