Prioritization of the Detection Engineering Backlog
https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981
https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981
Medium
Prioritization of the Detection Engineering Backlog
Written by Joshua Prager and Emily Leidy
Uncovering Window Security Events
Part 1: TelemetrySource
https://posts.specterops.io/uncovering-window-security-events-ab72e1ec745c
Part 1: TelemetrySource
https://posts.specterops.io/uncovering-window-security-events-ab72e1ec745c
Medium
Uncovering Windows Events
Part 1: TelemetrySource
Stalking inside of your Chromium Browser
https://posts.specterops.io/stalking-inside-of-your-chromium-browser-757848b67949
https://posts.specterops.io/stalking-inside-of-your-chromium-browser-757848b67949
Medium
Stalking inside of your Chromium Browser
Stalking inside of your Chromium Browser Revisiting Remote Debugging Okay, you got your favorite agent running on the target machine. You did a process listing, but nothing interesting popped out …
Passwordless Persistence and Privilege Escalation in Azure
https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f
https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f
SpecterOps
Passwordless Persistence and Privilege Escalation in Azure - SpecterOps
How Certificate Based Authentication works, passwordless persistence with CBA, passwordless privilege escalation, prevention, detection, and more.
The Defender’s Guide to Windows Services (update)
https://posts.specterops.io/the-defenders-guide-to-windows-services-67c1711ecba7
https://posts.specterops.io/the-defenders-guide-to-windows-services-67c1711ecba7
SpecterOps
Blog - SpecterOps
Your new best friend: Introducing BloodHound Community Edition!
🔥1
At the Edge of Tier Zero: The Curious Case of the RODC
https://posts.specterops.io/at-the-edge-of-tier-zero-the-curious-case-of-the-rodc-ef5f1799ca06
https://posts.specterops.io/at-the-edge-of-tier-zero-the-curious-case-of-the-rodc-ef5f1799ca06
SpecterOps
At the Edge of Tier Zero: The Curious Case of the RODC - SpecterOps
In this blog post, we’ll answer the question, “If I compromise a Read-Only Domain Controller, can I compromise the domain?” or, “Do RODCs belong in Tier Zero?”
Abusing Azure App Service Managed Identity Assignments
https://posts.specterops.io/abusing-azure-app-service-managed-identity-assignments-c3adefccff95
https://posts.specterops.io/abusing-azure-app-service-managed-identity-assignments-c3adefccff95
Medium
Abusing Azure App Service Managed Identity Assignments
Intro
BOFHound: Session Integration #BOFHound #SessionIntegration #LDAPenumeration #BloodHound #AttackPathMapping https://posts.specterops.io/bofhound-session-integration-7b88b6f18423
SpecterOps
BOFHound: Session Integration - SpecterOps
In this post, we examine BOFHound-compatible BOFs and usage examples that allow an operator to take a manual and targeted approach to attack path mapping.
Getting Started with BHE — Part 2
https://posts.specterops.io/getting-started-with-bhe-part-2-fbeeeb2501ee
https://posts.specterops.io/getting-started-with-bhe-part-2-fbeeeb2501ee
SpecterOps
Getting Started with BHE — Part 2 - SpecterOps
Contextualizing Tier Zero TL;DR An accurately defined Tier Zero provides an accurate depiction of Attack Path Findings in your BHE tenant. Different principals (groups, GPOs, OUs, etc.) have different implications when Tier Zero is defined — understanding…
👍2