blog category
Research & Tradecraft
Research & Tradecraft
Years ago I was chatting with a few experienced red teamers and one was lamenting token...
Jul 7, 2022 • 14 min read
Read Post
Research & Tradecraft
Relaying NTLM Authentication from SCCM Clients
tl;dr: Seriously, please disable NTLM I recently learned that you can coerce NTLM authentication from SCCM servers...
Jun 30, 2022 • 16 min read
Read Post
Research & Tradecraft
The Phantom Credentials of SCCM: Why the NAA Won’t Die
TL;DR — Stop Using Network Access Accounts! If a Windows machine has ever been an SCCM client, there...
Jun 28, 2022 • 10 min read
Read Post
Research & Tradecraft
Understanding the Function Call Stack
There’s more than meets the eye under the function call hood This post is based on a...
Jun 27, 2022 • 11 min read
Read Post
Research & Tradecraft
The Ghostwriter team recently released v3.0.0. This release represents a significant milestone for the project, and...
Jun 14, 2022 • 5 min read
Read Post
Research & Tradecraft
Managed Identity Attack Paths, Part 3: Function Apps
Intro and Prior Work In this three part blog series we have explored attack paths that emerge...
Jun 8, 2022 • 10 min read
Read Post
Research & Tradecraft
Managed Identity Attack Paths, Part 2: Logic Apps
Intro and Prior Work In this three part blog series we are exploring attack paths that emerge...
Jun 7, 2022 • 9 min read
Read Post
Research & Tradecraft
Managed Identity Attack Paths, Part 1: Automation Accounts
Intro and Prior Work In this three part blog series we will explore attack paths that emerge...
Jun 6, 2022 • 12 min read
Read Post
Research & Tradecraft
DeepPass — Finding Passwords With Deep Learning
DeepPass — Finding Passwords With Deep Learning One of the routine tasks operators regularly encounter on most engagements is...