blog category

Research & Tradecraft

image for The Security Principle Every Attacker Needs to Follow

Research & Tradecraft

The Security Principle Every Attacker Needs to Follow

Earlier this year, I was tasked with developing a follow-on course for our renowned Adversary Tactics:...

By: Elad Shamir
Jul 17, 2024 • 12 min read
Read Post
image for Phish Out of Water

Research & Tradecraft

Phish Out of Water

PHISHING SCHOOL Bypassing Web Proxies so Your Phish Don’t Suffocate You just fought long and hard...

By: Forrest Kasler
Jul 16, 2024 • 13 min read
Read Post
image for Mythic 3.3 Beta: Rise of the Events

Research & Tradecraft

Mythic 3.3 Beta: Rise of the Events

A brief overview of Mythic 3.3’s new features Eventing Flows Mythic 3.3 Updates Mythic 3.3 has too many...

By: Cody Thomas
Jul 15, 2024 • 8 min read
Read Post
image for Drink Like a Phish

Research & Tradecraft

Drink Like a Phish

PHISHING SCHOOL How to Make Your Phishing Sites Blend In As you read this, bots are coming...

By: Forrest Kasler
Jul 9, 2024 • 12 min read
Read Post
image for Like Shooting Phish in a Barrel

Research & Tradecraft

Like Shooting Phish in a Barrel

PHISHING SCHOOL Bypassing Link Crawlers You’ve just convinced a target user to click your link. In doing...

By: Forrest Kasler
Jul 2, 2024 • 14 min read
Read Post
image for An AWS Administrator Identity Crisis: Part 1

Research & Tradecraft

An AWS Administrator Identity Crisis: Part 1

BLUF: Every attack path needs a destination. This is a formalized way of describing destinations in...

By: Daniel Heinsen
Jun 28, 2024 • 11 min read
Read Post
image for I Will Make you Phishers of Men

Research & Tradecraft

I Will Make you Phishers of Men

PHISHING SCHOOL Convincing Targets to Click Your Links When it comes to phishing advice, the number one...

By: Forrest Kasler
Jun 25, 2024 • 21 min read
Read Post
image for Deconstructing Logon Session Enumeration

Research & Tradecraft

Deconstructing Logon Session Enumeration

Purple Teaming How we define and create test cases for our purple team runbooks Intro In our...

By: garrett white
Jun 21, 2024 • 11 min read
Read Post
image for How Privileged Identity Management Affects Conditional Access Policies

Research & Tradecraft

How Privileged Identity Management Affects Conditional Access Policies

Introduction When administrators use directory roles (aka Entra ID roles) when configuring Conditional Access Policies (CAPs),...

By: Hope Walker
Jun 20, 2024 • 11 min read
Read Post