blog category

Research & Tradecraft

image for Phishing With Dynamite

Research & Tradecraft

Phishing With Dynamite

Token stealing is getting harder. Instead, stealing whole logged-in browser instances may be an easier and...

By: Forrest Kasler
Nov 7, 2023 • 9 min read
Read Post
image for Domain of Thrones: Part II

Research & Tradecraft

Domain of Thrones: Part II

Written by Nico Shyne & Josh Prager Introduction Part II In the first installment of “Domain of Thrones,”...

By: joshua prager
Nov 6, 2023 • 20 min read
Read Post
image for On Detection: Tactical to Functional

Research & Tradecraft

On Detection: Tactical to Functional

Part 10: Implicit Process Create Introduction Welcome back to another installment of the On Detection: Tactical to...

By: Jared Atkinson
Nov 1, 2023 • 22 min read
Read Post
image for Part 10: Implicit Process Create

Research & Tradecraft

Part 10: Implicit Process Create

By: Jared Atkinson
Nov 1, 2023 • 25 min read
Read Post
image for Lateral Movement: Abuse the Power of DCOM Excel Application

Research & Tradecraft

Lateral Movement: Abuse the Power of DCOM Excel Application

In this post, we will talk about an interesting lateral movement technique called ActivateMicrosoftApp() method within...

By: Raj Patel
Oct 30, 2023 • 10 min read
Read Post
image for CVE-2023–4632: Local Privilege Escalation in Lenovo System Updater

Research & Tradecraft

CVE-2023–4632: Local Privilege Escalation in Lenovo System Updater

Version: Lenovo Updater Version <= 5.08.01.0009 Operating System Tested On: Windows 10 22H2 (x64) Vulnerability: Lenovo...

By: Matt Nelson
Oct 26, 2023 • 5 min read
Read Post
image for On Detection: Tactical to Functional

Research & Tradecraft

On Detection: Tactical to Functional

Part 9: Perception vs. Conception The concepts discussed in this post are related to those discussed...

By: Jared Atkinson
Oct 20, 2023 • 18 min read
Read Post
image for BloodHound Enterprise: Securing Active Directory Using Graph Theory

Research & Tradecraft

BloodHound Enterprise: Securing Active Directory Using Graph Theory

BloodHound Enterprise: Securing Active Directory Using Graphs Prior to my employment at SpecterOps, I hadn’t worked...

By: Irshad Ajmal Ahmed
Oct 20, 2023 • 6 min read
Read Post
image for Part 9: Perception vs. Conception

Research & Tradecraft

Part 9: Perception vs. Conception

By: Jared Atkinson
Oct 20, 2023 • 18 min read
Read Post