blog category

Research & Tradecraft

image for Part 10: Implicit Process Create

Research & Tradecraft

Part 10: Implicit Process Create

By: Jared Atkinson
Nov 1, 2023 • 25 min read
Read Post
image for Lateral Movement: Abuse the Power of DCOM Excel Application

Research & Tradecraft

Lateral Movement: Abuse the Power of DCOM Excel Application

In this post, we will talk about an interesting lateral movement technique called ActivateMicrosoftApp() method within...

By: Raj Patel
Oct 30, 2023 • 10 min read
Read Post
image for CVE-2023–4632: Local Privilege Escalation in Lenovo System Updater

Research & Tradecraft

CVE-2023–4632: Local Privilege Escalation in Lenovo System Updater

Version: Lenovo Updater Version <= 5.08.01.0009 Operating System Tested On: Windows 10 22H2 (x64) Vulnerability: Lenovo...

By: Matt Nelson
Oct 26, 2023 • 5 min read
Read Post
image for On Detection: Tactical to Functional

Research & Tradecraft

On Detection: Tactical to Functional

Part 9: Perception vs. Conception The concepts discussed in this post are related to those discussed...

By: Jared Atkinson
Oct 20, 2023 • 18 min read
Read Post
image for BloodHound Enterprise: Securing Active Directory Using Graph Theory

Research & Tradecraft

BloodHound Enterprise: Securing Active Directory Using Graph Theory

BloodHound Enterprise: Securing Active Directory Using Graphs Prior to my employment at SpecterOps, I hadn’t worked...

By: Irshad Ajmal Ahmed
Oct 20, 2023 • 6 min read
Read Post
image for Part 9: Perception vs. Conception

Research & Tradecraft

Part 9: Perception vs. Conception

By: Jared Atkinson
Oct 20, 2023 • 18 min read
Read Post
image for Uncovering RPC Servers through Windows API Analysis

Research & Tradecraft

Uncovering RPC Servers through Windows API Analysis

Intro Have you ever tried to reverse a simple Win32 API? If not, let’s look at...

By: Kai Huang
Oct 18, 2023 • 18 min read
Read Post
image for Perfect Loader Implementations

Research & Tradecraft

Perfect Loader Implementations

Thank you to SpecterOps for supporting this research and to Lee and Sarah for proofreading and...

By: Evan McBroom
Oct 9, 2023 • 6 min read
Read Post
image for SCCM Hierarchy Takeover

Research & Tradecraft

SCCM Hierarchy Takeover

One Site to Rule Them All tl;dr: There is no security boundary between sites in the same...

By: Chris Thompson
Sep 25, 2023 • 13 min read
Read Post