blog category

Research & Tradecraft

image for Maestro: Abusing Intune for Lateral Movement Over C2

Research & Tradecraft

Maestro: Abusing Intune for Lateral Movement Over C2

By: Chris Thompson
Oct 31, 2024 • 13 min read
Read Post
image for BOFHound: AD CS Integration

Research & Tradecraft

BOFHound: AD CS Integration

TL;DR: BOFHound can now parse Active Directory Certificate Services (AD CS) objects, manually queried from LDAP,...

By: Matt Creel
Oct 30, 2024 • 14 min read
Read Post
image for Dotnet Source Generators in 2024 Part 1: Getting Started

Research & Tradecraft

Dotnet Source Generators in 2024 Part 1: Getting Started

Introduction In this blog post, we will cover the basics of a source generator, the major...

By: Jonathan Owens
Oct 1, 2024 • 35 min read
Read Post
image for Ghostwriter v4.3: SSO, JSON Fields, and Reporting with BloodHound

Research & Tradecraft

Ghostwriter v4.3: SSO, JSON Fields, and Reporting with BloodHound

Ghostwriter v4.3 is available now, and it enhances features introduced in previous versions of v4 in...

By: Christopher Maddalena
Sep 23, 2024 • 7 min read
Read Post
image for ADCS Attack Paths in BloodHound — Part 3

Research & Tradecraft

ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3 In Part 1 of this series, we explained how we incorporated...

By: Jonas Bülow Knudsen
Sep 11, 2024 • 22 min read
Read Post
image for Mythic 3.3 — Out of Beta

Research & Tradecraft

Mythic 3.3 — Out of Beta

Mythic 3.3 — Out of Beta Mythic 3.3 was released in a Beta six weeks ago, and since then...

By: Cody Thomas
Aug 28, 2024 • 10 min read
Read Post
image for Ghostwriter ❤ Tool Integration

Research & Tradecraft

Ghostwriter ❤ Tool Integration

Incorporating new components into existing systems is such a pain, this process has been labeled “Integration...

By: Alexander Sou
Aug 27, 2024 • 5 min read
Read Post
image for Navigating the Uncharted: A Framework for Attack Path Discovery

Research & Tradecraft

Navigating the Uncharted: A Framework for Attack Path Discovery

This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the...

By: Elad Shamir
Aug 20, 2024 • 8 min read
Read Post
image for Sleeping With the Phishes

Research & Tradecraft

Sleeping With the Phishes

Hiding C2 With Stealthy Callback Channels Write a custom command and control (C2) implant — Check...

By: Forrest Kasler
Aug 14, 2024 • 12 min read
Read Post