blog category

Research & Tradecraft

image for EntropyCapture: Simple Extraction of DPAPI Optional Entropy

Research & Tradecraft

EntropyCapture: Simple Extraction of DPAPI Optional Entropy

Intro During a short application assessment, enumeration and decryption of a third-party application’s Windows Data Protection...

May 18, 2022 • 5 min read
Read Post
image for Learning Machine Learning Part 3: Attacking Black Box Models

Research & Tradecraft

Learning Machine Learning Part 3: Attacking Black Box Models

In the first post in this series we covered a brief background on machine learning, the...

May 4, 2022 • 29 min read
Read Post
image for Learning Machine Learning Part 2: Attacking White Box Models

Research & Tradecraft

Learning Machine Learning Part 2: Attacking White Box Models

In the previous post, I went through a very brief overview of some machine learning concepts,...

Apr 26, 2022 • 31 min read
Read Post
image for Abusing Azure Container Registry Tasks

Research & Tradecraft

Abusing Azure Container Registry Tasks

Intro and Prior Work More and more organizations are adopting cloud computing, migrating existing business processes and...

Apr 20, 2022 • 17 min read
Read Post
image for Coercing NTLM Authentication from SCCM

Research & Tradecraft

Coercing NTLM Authentication from SCCM

tl;dr: Disable NTLM for Client Push Installation When SCCM automatic site assignment and automatic client push...

Apr 13, 2022 • 28 min read
Read Post
image for Ghostwriter v2.3.0 & 2022 Road Map

Research & Tradecraft

Ghostwriter v2.3.0 & 2022 Road Map

Ghostwriter is changing! We try to be transparent with our development work, but it has been...

Apr 6, 2022 • 5 min read
Read Post
image for Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation

Research & Tradecraft

Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation

For the past two years I’ve been trying to get a grasp on the field of...

Apr 5, 2022 • 34 min read
Read Post
image for Revisiting Phishing Simulations

Research & Tradecraft

Revisiting Phishing Simulations

This post was written by Matt Hand and the rest of the SpecterOps team. Overview SpecterOps...

Mar 9, 2022 • 20 min read
Read Post
image for Introducing BloodHound 4.1 — The Three Headed Hound

Research & Tradecraft

Introducing BloodHound 4.1 — The Three Headed Hound

Introducing BloodHound 4.1 — The Three Headed Hound Prior Work Analyzing Active Directory attack paths using graph theory is...

Feb 9, 2022 • 6 min read
Read Post