blog category
Research & Tradecraft

Research & Tradecraft
EntropyCapture: Simple Extraction of DPAPI Optional Entropy
Intro During a short application assessment, enumeration and decryption of a third-party application’s Windows Data Protection...
May 18, 2022 • 5 min read
Read Post
Research & Tradecraft
Learning Machine Learning Part 3: Attacking Black Box Models
In the first post in this series we covered a brief background on machine learning, the...
May 4, 2022 • 29 min read
Read Post
Research & Tradecraft
Learning Machine Learning Part 2: Attacking White Box Models
In the previous post, I went through a very brief overview of some machine learning concepts,...
Apr 26, 2022 • 31 min read
Read Post
Research & Tradecraft
Abusing Azure Container Registry Tasks
Intro and Prior Work More and more organizations are adopting cloud computing, migrating existing business processes and...
Apr 20, 2022 • 17 min read
Read Post
Research & Tradecraft
Coercing NTLM Authentication from SCCM
tl;dr: Disable NTLM for Client Push Installation When SCCM automatic site assignment and automatic client push...
Apr 13, 2022 • 28 min read
Read Post
Research & Tradecraft
Ghostwriter v2.3.0 & 2022 Road Map
Ghostwriter is changing! We try to be transparent with our development work, but it has been...
Apr 6, 2022 • 5 min read
Read PostResearch & Tradecraft
Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation
For the past two years I’ve been trying to get a grasp on the field of...
Apr 5, 2022 • 34 min read
Read Post
Research & Tradecraft
Revisiting Phishing Simulations
This post was written by Matt Hand and the rest of the SpecterOps team. Overview SpecterOps...
Mar 9, 2022 • 20 min read
Read PostResearch & Tradecraft
Introducing BloodHound 4.1 — The Three Headed Hound
Introducing BloodHound 4.1 — The Three Headed Hound Prior Work Analyzing Active Directory attack paths using graph theory is...