blog category
Research & Tradecraft
Research & Tradecraft
Operating Outside the Box: NTLM Relaying Low-Privilege HTTP Auth to LDAP
TL;DR When operating out of a ceded access or phishing payload with no credential material, you...
By: Logan Goins
Aug 22, 2025 • 13 min read
Read Post
Research & Tradecraft
Transforming Red Team Ops with Mythic’s Hidden Gems: Browser Scripting
TL;DR Mythic’s browser scripting provides tons of flexibility that operators can tailor to their unique needs...
By: Alexander K. DeMine
Aug 21, 2025 • 30 min read
Read Post
Research & Tradecraft
ARM-ed and Dangerous: Dylib Injection on macOS
Modern Dylib Injection Techniques for AArch64 macOS TL;DR This post details how I extended the Mythic...
By: West Shepherd
Aug 21, 2025 • 24 min read
Read Post
Research & Tradecraft
TL;DR WebClient is a common targeted service for NTLM relay attacks. In this post we will...
By: Steven Flores
Aug 19, 2025 • 31 min read
Read Post
Research & Tradecraft
Juicing ntds.dit Files to the Last Drop
TL;DR Several new Active Directory offline attack capabilities have recently been added to the DSInternals PowerShell module....
By: Michael Grafnetter
Aug 14, 2025 • 11 min read
Read Post
Research & Tradecraft
Going for Broke(ring) – Offensive Walkthrough for Nested App Authentication
TL;DR: Microsoft uses nested app authentication (NAA) for many applications. Access and refresh tokens for select...
By: Hope Walker
Aug 13, 2025 • 19 min read
Read Post
Research & Tradecraft
HKLM\SYSTEM\Setup\sMarTdEpLoY – The (Static) Keys to Abusing PDQ SmartDeploy
TL;DR: Prior to version 3.0.2046, PDQ SmartDeploy used static, hardcoded, and universal encryption keys for secure...
By: Garrett Foster
Aug 12, 2025 • 10 min read
Read Post
Research & Tradecraft
TL;DR Due to modern advances in the AD CS attack landscape, an update to Certify was...
By: Valdemar Carøe
Aug 11, 2025 • 16 min read
Read Post
Research & Tradecraft
TL;DR We took a chainsaw to Nemesis 1.0, kept the parts that operators loved (i.e., automated...