What is Tier Zero — Part 2
What is Tier Zero — Part 2 Round 2! This is Part 2 of our webinar and blog post series Defining the Undefined: What is Tier Zero. In Part 1, we gave an introduction to the topic and explained why the reader should care. We discussed Microsoft’s original list of Tier Zero Active Directory (AD) groups, and we defined […]
Shadow Wizard Registry Gang: Structured Registry Querying
Why Do We Need New Tooling for Registry Collection? The Windows registry, an intricate database storing settings for both the operating system and the applications that run on it, is a treasure trove of valuable information. It is known. For this reason, countless offensive security tools have emerged to query the Windows registry, especially for […]
Site Takeover via SCCM’s AdminService API
tl:dr: The SCCM AdminService API is vulnerable to NTLM relaying and can be abused for SCCM site takeover. Prior Work and Credit Before I get started, I’d like to acknowledge some of the work previously done that inspired researching SCCM. Chris Thompson previously covered multiple issues involving SCCM, including a site takeover primitive via MSSQL, and […]
BloodHound Community Edition: A New Era
I’m proud to announce the availability of BloodHound Community Edition (BloodHound CE)! What you need to know: The free and open-source version of BloodHound is now known as BloodHound CE and will remain free and open-source forever under the Apache 2.0 License BloodHound CE now shares a common code base and documentation with BloodHound Enterprise (BHE), and […]
BloodHound Enterprise Learns Some New Tricks
Summary The BloodHound code-convergence project brings some significant and long-desired feature enhancements to BloodHound Enterprise (BHE): Cypher search, including pre-built queries for AD and Azure Built-in support for offline data collection (i.e., control systems or acquisition use cases) Expanded capabilities for pathfinding BloodHound Enterprise customers will get access to these features on Monday, August 7, 2023, and […]
Your new best friend: Introducing BloodHound Community Edition
Summary SpecterOps is pleased to announce BloodHound Community Edition (CE) will be available in early access on August 8, 2023! In this blog: BloodHound is now BloodHound CE; new name, slightly different look, same purpose and capability. BloodHound CE has new features and is based on the BloodHound Enterprise (BHE) code base. As a result, BloodHound CE […]
Introduction The offensive security industry is a curious one. On the one hand, we are ahead in various trends (or “thought leadership,” as some would have us term it) and are used to literally “moving fast and breaking things.” On the other hand, we’re far behind similar disciplines. One major area where offensive security has […]
Performance, Diagnostics, and WMI
Windows offers tons of useful tools that administrators can leverage to perform their daily jobs. A lot of times, those tools are looked at from an offensive standpoint and use cases for them are discovered. Earlier this year I read a message from a co-worker Lee Christensen (@tifkin_) about Service Performance DLLs and upon further […]
Sowing Chaos and Reaping Rewards in Confluence and Jira
Introduction Let me paint a picture for you. You’re on a red team operation, operating from your favorite C2, and have just landed on a user’s workstation. You decide to take a look at their DNS cache to get a list of internal resources the user has been browsing and as you look through the […]
What is Tier Zero — Part 1
What is Tier Zero — Part 1 Tier Zero is a crucial group of assets in Active Directory (AD) and Azure. Its purpose is to protect the most critical components by creating a security boundary and preventing a complete compromise. Defining Tier Zero for your environment is not a straightforward task. It involves examining various assets and their […]