
Will Schroeder
See the latest by Will Schroeder
Years ago I was chatting with a few experienced red teamers and one was lamenting token...
By: Will Schroeder
Jul 7, 2022 • 14 min read
Read Post
DeepPass — Finding Passwords With Deep Learning
DeepPass — Finding Passwords With Deep Learning One of the routine tasks operators regularly encounter on most engagements is...
By: Will Schroeder
Jun 1, 2022 • 15 min read
Read Post
Learning Machine Learning Part 3: Attacking Black Box Models
In the first post in this series we covered a brief background on machine learning, the...
By: Will Schroeder
May 4, 2022 • 29 min read
Read Post
Learning Machine Learning Part 2: Attacking White Box Models
In the previous post, I went through a very brief overview of some machine learning concepts,...
By: Will Schroeder
Apr 26, 2022 • 31 min read
Read Post
Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation
For the past two years I’ve been trying to get a grasp on the field of...
By: Will Schroeder
Apr 5, 2022 • 34 min read
Read Post
L;DR Active Directory Certificate Services has a lot of attack potential! Check out our whitepaper “Certified Pre-Owned:...
By: Will Schroeder
Jun 17, 2021 • 28 min read
Read Post

A Case Study in Wagging the Dog: Computer Takeover
By: Will Schroeder
Feb 6, 2019 • 7 min read
Read Post
Not A Security Boundary: Breaking Forest Trusts