blog category
Research & Tradecraft

Research & Tradecraft
Ghostwriter v4: 2FA, RBAC, and Logging, Oh My!
Ghostwriter v4 is officially here! Technically, it’s been available as a release candidate for a while,...
Sep 20, 2023 • 7 min read
Read Post
Research & Tradecraft
Reactive Progress and Tradecraft Innovation
Detection as Prediction The overarching goal of a security operations program is to prevent or mitigate...
Sep 19, 2023 • 22 min read
Read Post
Research & Tradecraft
Shadow Wizard Registry Gang: Structured Registry Querying
Why Do We Need New Tooling for Registry Collection? The Windows registry, an intricate database storing...
Sep 5, 2023 • 10 min read
Read Post
Research & Tradecraft
Site Takeover via SCCM’s AdminService API
tl:dr: The SCCM AdminService API is vulnerable to NTLM relaying and can be abused for SCCM...
Aug 10, 2023 • 9 min read
Read Post
Research & Tradecraft
In the first post in this series, On (Structured) Data, we talked about the gap area...
Aug 9, 2023 • 22 min read
Read Post
Research & Tradecraft
Challenges In Post-Exploitation Workflows
In our previous post, we talked about the problem of structured data in the post-exploitation community....
Aug 2, 2023 • 16 min read
Read Post
Research & Tradecraft
Introduction The offensive security industry is a curious one. On the one hand, we are ahead...
Jul 26, 2023 • 10 min read
Read Post
Research & Tradecraft
Performance, Diagnostics, and WMI
Windows offers tons of useful tools that administrators can leverage to perform their daily jobs. A...
Jul 11, 2023 • 10 min read
Read Post
Research & Tradecraft
Sowing Chaos and Reaping Rewards in Confluence and Jira
Introduction Let me paint a picture for you. You’re on a red team operation, operating from...