blog category

Research & Tradecraft

image for Uncovering RPC Servers through Windows API Analysis

Research & Tradecraft

Uncovering RPC Servers through Windows API Analysis

Intro Have you ever tried to reverse a simple Win32 API? If not, let’s look at...

By: Kai Huang
Oct 18, 2023 • 18 min read
Read Post
image for Perfect Loader Implementations

Research & Tradecraft

Perfect Loader Implementations

Thank you to SpecterOps for supporting this research and to Lee and Sarah for proofreading and...

By: Evan McBroom
Oct 9, 2023 • 6 min read
Read Post
image for SCCM Hierarchy Takeover

Research & Tradecraft

SCCM Hierarchy Takeover

One Site to Rule Them All tl;dr: There is no security boundary between sites in the same...

By: Chris Thompson
Sep 25, 2023 • 13 min read
Read Post
image for Ghostwriter v4: 2FA, RBAC, and Logging, Oh My!

Research & Tradecraft

Ghostwriter v4: 2FA, RBAC, and Logging, Oh My!

Ghostwriter v4 is officially here! Technically, it’s been available as a release candidate for a while,...

By: Christopher Maddalena
Sep 20, 2023 • 7 min read
Read Post
image for Reactive Progress and Tradecraft Innovation

Research & Tradecraft

Reactive Progress and Tradecraft Innovation

Detection as Prediction The overarching goal of a security operations program is to prevent or mitigate...

By: Michael Barclay
Sep 19, 2023 • 22 min read
Read Post
image for Shadow Wizard Registry Gang: Structured Registry Querying

Research & Tradecraft

Shadow Wizard Registry Gang: Structured Registry Querying

Why Do We Need New Tooling for Registry Collection? The Windows registry, an intricate database storing...

By: Max Harley
Sep 5, 2023 • 10 min read
Read Post
image for Crypto Census: Automating Cryptomining Domain Indicator Detections

Research & Tradecraft

Crypto Census: Automating Cryptomining Domain Indicator Detections

By: Alexander Sou
Aug 29, 2023 • 14 min read
Read Post
image for Site Takeover via SCCM’s AdminService API

Research & Tradecraft

Site Takeover via SCCM’s AdminService API

tl:dr: The SCCM AdminService API is vulnerable to NTLM relaying and can be abused for SCCM...

By: Garrett Foster
Aug 10, 2023 • 9 min read
Read Post
image for Hacking With Your Nemesis

Research & Tradecraft

Hacking With Your Nemesis

In the first post in this series, On (Structured) Data, we talked about the gap area...

By: Will Schroeder
Aug 9, 2023 • 22 min read
Read Post