blog category

Research & Tradecraft

image for Koh: The Token Stealer

Research & Tradecraft

Koh: The Token Stealer

Years ago I was chatting with a few experienced red teamers and one was lamenting token...

Jul 7, 2022 • 14 min read
Read Post
image for Relaying NTLM Authentication from SCCM Clients

Research & Tradecraft

Relaying NTLM Authentication from SCCM Clients

tl;dr: Seriously, please disable NTLM I recently learned that you can coerce NTLM authentication from SCCM servers...

Jun 30, 2022 • 16 min read
Read Post
image for The Phantom Credentials of SCCM: Why the NAA Won’t Die

Research & Tradecraft

The Phantom Credentials of SCCM: Why the NAA Won’t Die

TL;DR — Stop Using Network Access Accounts! If a Windows machine has ever been an SCCM client, there...

Jun 28, 2022 • 10 min read
Read Post
image for Understanding the Function Call Stack

Research & Tradecraft

Understanding the Function Call Stack

There’s more than meets the eye under the function call hood This post is based on a...

Jun 27, 2022 • 11 min read
Read Post
image for Introducing Ghostwriter v3.0

Research & Tradecraft

Introducing Ghostwriter v3.0

The Ghostwriter team recently released v3.0.0. This release represents a significant milestone for the project, and...

Jun 14, 2022 • 5 min read
Read Post
image for Managed Identity Attack Paths, Part 3: Function Apps

Research & Tradecraft

Managed Identity Attack Paths, Part 3: Function Apps

Intro and Prior Work In this three part blog series we have explored attack paths that emerge...

Jun 8, 2022 • 10 min read
Read Post
image for Managed Identity Attack Paths, Part 2: Logic Apps

Research & Tradecraft

Managed Identity Attack Paths, Part 2: Logic Apps

Intro and Prior Work In this three part blog series we are exploring attack paths that emerge...

Jun 7, 2022 • 9 min read
Read Post
image for Managed Identity Attack Paths, Part 1: Automation Accounts

Research & Tradecraft

Managed Identity Attack Paths, Part 1: Automation Accounts

Intro and Prior Work In this three part blog series we will explore attack paths that emerge...

Jun 6, 2022 • 12 min read
Read Post
image for DeepPass — Finding Passwords With Deep Learning

Research & Tradecraft

DeepPass — Finding Passwords With Deep Learning

DeepPass — Finding Passwords With Deep Learning One of the routine tasks operators regularly encounter on most engagements is...

Jun 1, 2022 • 15 min read
Read Post