blog category
Research & Tradecraft

Research & Tradecraft
On Detection: From Tactical to Functional
In his 1931 paper “A Non-Aristotelian System and Its Necessity for Rigour in Mathematics and Physics,”...
By: Jared Atkinson
Jun 1, 2023 • 15 min read
Read Post

Research & Tradecraft
Beyond Procedures: Digging into the Function Call Stack
Within the cybersecurity industry, many of us have a natural inclination towards digging into technical concepts...
By: Nathan Davis
May 24, 2023 • 20 min read
Read Post
Research & Tradecraft
There’s a new, practical way to escalate from Domain Admin to Enterprise Admin. ESC5 You’ve heard...
By: Andy Robbins
May 16, 2023 • 9 min read
Read Post
Research & Tradecraft
C2 and the Docker Dance: Mythic 3.0’s Marvelous Microservice Moves
— Title by ChatGPT for introducing Mythic 3.0 What is Mythic? Mythic is a plug-n-play command and control...
By: Cody Thomas
May 10, 2023 • 13 min read
Read Post
Research & Tradecraft
Exploring Impersonation through the Named Pipe Filesystem Driver
Introduction Impersonation happens often natively in Windows, however, adversaries also use it to run code in...
By: Jonathan Johnson
May 3, 2023 • 10 min read
Read Post
Research & Tradecraft
Introducing BloodHound 4.3 — Get Global Admin More Often
Introducing BloodHound 4.3 — Get Global Admin More Often Discover new attack paths traversing Microsoft Graph and seven new...
By: Andy Robbins
Apr 18, 2023 • 14 min read
Read Post
Research & Tradecraft
Summary: Given that: Temporary Access Passes (TAP) are enabled in the Azure AD tenant AND You...
By: Daniel Heinsen
Mar 29, 2023 • 22 min read
Read Post
Research & Tradecraft
Abusing Azure App Service Managed Identity Assignments
Intro Azure App Service is a Platform-as-a-Service product that promises to improve web application deployment, hosting,...