Protect mission-critical assets from identity compromise with new Privilege Zones in BloodHound Enterprise. Learn More

  • Blog
  • Support
  • Contact Us
    • Blog
    • Support
    • Contact Us
  • Services
    • PROGRAM DEVELOPMENT
      • Overview
      • Developing Capabilities
      • Expert Support
    • Assessments
      • Penetration Testing
      • Red Team Engagements
      • Purple Team Assessments
      • Maturity Assessments
      • AD Attack Path Assessments
      • Artificial Intelligence Red Team
  • Products
    • BLOODHOUND
      • BloodHound Community Edition
        • Overview
        • BloodHound Feature Comparisons
        • GitHub
        • Get Started
      • BloodHound Enterprise
        • Overview
          • What is Attack Path Management?
          • Interactive Demos
          • BloodHound Feature Comparisons
          • Privilege Zones
        • Use Cases
          • Privileged Access Governance and Compliance
          • Scaling Beyond BloodHound Community Edition
          • Eliminate Lateral Movement
          • Manage Identity Risk
          • Mergers and Acquisitions
        • Industry
          • Public Sector
          • Financial Services
          • Healthcare
        • Support
        • Get a Demo
    • Go to Slack
    • Go to Docs
  • Training
    • Adversary Tactics Training Courses
      • Red Team Operations
      • Identity-Driven Offensive Tradecraft
      • Tradecraft Analysis
      • Detection
      • Vulnerability Research for Operators
      • Active Directory Security Fundamentals
      • Adversary Perspectives: Azure
    • Private Training
      • Talk to us
  • Partners
    • SpecterOps Partner Program
    • Identify your customers attack paths before attackers do
      • Become a Partner
      • Partner Portal Sign In
  • About
    • ABOUT US
      • Who We Are
      • Values
      • Team
      • Careers
      • Contact Us
  • News
    • Announcements
    • Newsroom
  • Resources
    • RESOURCES
      • Blog
      • Research & Insights
      • White Papers
      • Case Studies
      • Sponsored Tools
      • Vulnerability Acknowledgements
      • Datasheets
  • Events
    • Sponsored Events
    • Talks
    • Training Courses
    • Webinars
    • Meet Ups
Get a Demo
Get a Demo
< Back to Blog
Default Author Image

Jeff Dimmock

See the latest by Jeff Dimmock

Image for post titled F’Awk Yeah! Advanced sed and awk Usage (Parsing for Pentesters 3)

F’Awk Yeah! Advanced sed and awk Usage (Parsing for Pentesters 3)

By: Jeff Dimmock
Oct 23, 2020 • 18 min read
Read Post
Image for post titled HTTPS Payload and C2 Redirectors

HTTPS Payload and C2 Redirectors

By: Jeff Dimmock
Apr 11, 2018 • 12 min read
Read Post
Image for post titled Cobalt Strike OPSEC Profiles

Cobalt Strike OPSEC Profiles

By: Jeff Dimmock
Jan 22, 2018 • 7 min read
Read Post
Image for post titled Designing Effective Covert Red Team Attack Infrastructure

Designing Effective Covert Red Team Attack Infrastructure

By: Jeff Dimmock
Dec 4, 2017 • 20 min read
Read Post
Image for post titled Randomized Malleable C2 Profiles Made Easy

Randomized Malleable C2 Profiles Made Easy

By: Jeff Dimmock
Aug 29, 2017 • 6 min read
Read Post
Image for post titled Attack Infrastructure Log Aggregation and Monitoring

Attack Infrastructure Log Aggregation and Monitoring

By: Jeff Dimmock
Aug 7, 2017 • 9 min read
Read Post
Image for post titled Serving Random Payloads with Apache mod_rewrite

Serving Random Payloads with Apache mod_rewrite

By: Jeff Dimmock
Jun 12, 2017 • 5 min read
Read Post
Image for post titled How To Pass the Ticket Through SSH Tunnels

How To Pass the Ticket Through SSH Tunnels

By: Jeff Dimmock
May 22, 2017 • 8 min read
Read Post
Image for post titled Red Teaming for Pacific Rim CCDC 2017

Red Teaming for Pacific Rim CCDC 2017

By: Jeff Dimmock
May 1, 2017 • 10 min read
Read Post
1 2 Next
Demystifying Adversary Tradecraft
Sign Up For Updates From SpecterOps
  • Sign Up For Updates From SpecterOps

  • This field is for validation purposes and should be left unchanged.

  • Services
    • Program Development
      • Developing Capabilities
      • Expert Support
    • Assessments
      • Penetration Testing
      • Red Team Engagements
      • Purple Team Assessments
      • Maturity Assessments
      • AD Attack Path Assessment
      • Artificial Intelligence Red Team
  • Products
    • BloodHound Community Edition
      • Overview
        • BloodHound Feature Comparison
      • GitHub
      • Get Started
    • BloodHound Enterprise
      • Overview
        • What is Attack Path Management?
        • Interactive Demos
        • BloodHound Feature Comparison
      • Use Cases
        • Privileged Access Governance and Compliance
        • Scaling Beyond BloodHound Community Edition
        • Eliminate Lateral Movement
        • Manage Identity Risk
        • Mergers and Acquisitions
      • Industry
        • Public Sector
        • Financial Services
        • Healthcare
      • Support
      • Get a Demo
  • Training
    • Adversary Tactics Training Courses
      • Red Team Operations
      • Identity-Driven Offensive Tradecraft
      • Tradecraft Analysis
      • Detection
      • Vulnerability Research for Operators
      • Active Directory Security Fundamentals
      • Adversary Perspectives: Azure
      • Private Training
  • News
    • Announcements
    • Newsroom
  • About Us
    • Who We Are
    • Values
    • Team
    • Careers
    • Contact Us
  • Resources
    • White Papers
    • Case Studies
    • Sponsored Tools
    • Vulnerability Acknowledgements
    • Datasheets
  • Blog
  • Events
    • Sponsored Events
    • Talks
    • Training Courses
    • Webinars
    • Meet Ups
Great Place to Work

Copyright 2025 Specter Ops, Inc. All Rights Reserved.

Terms of Service Privacy Policy Trust Center