Join SpecterOps at
Black Hat USA 2024 & DEF CON 32

Get a personalized demo at the SpecterOps booth
Hidden
Hidden
Hidden
Hidden
Hidden

SEE SPECTEROPS AT BLACK HAT USA 2024

Visit us at Booth #2600

Interested in speaking with the creators of your beloved open-source tools such as BloodHound Community Edition, Mythic, and Nemesis? Come visit us at our booth!

As experts in Identity Attack Path Management, we provide premier solutions, services, research, open-source tools, and training, all grounded in a deep understanding of adversary tradecraft. Additionally, discover how BloodHound Enterprise can streamline mitigation efforts, eliminate millions of Attack Paths, and enhance your security posture.

join our SpecterOps Party

Let The Good Times Roll:
A SpecterOps Bowling Party

Ready to kick off Black Hat with a bang? Or maybe you’re here for Defcon? Either way, come hang out with SpecterOps at our epic bowling party at Brooklyn Bowl in Las Vegas!

We’ll have drinks, tasty food, and good convos. And we don’t mean to brag, but our parties are kind of fun… 😎 so you don’t want to miss out!

Registrations will be checked at the door, so please make sure you RSVP.
All guests will receive an exclusive swag item.

Due to venue size, admittance is not guaranteed if we exceed headcount. Please register and show up on time.

WED, AUG 7 | 6:30 – 9:30PM PDT

Brooklyn Bowl | 3545 South Las Vegas Boulevard, Las Vegas, NV 89109

Black Hat USA 2024

Trainings

Elevate your skills by signing up for one of our four specialized courses

SpecterOps believes the human component to any security program is critical. Training is an essential part of building fundamental knowledge and perfecting the skills necessary to protect the enterprise; as most experts already know, buying tools and technical capabilities is not enough. The people behind those toolsets are what separates an average team from a high-performance force within your organization.

arsenal

Presenting our latest open-source tools
Wed, Aug 7 | 11:25am-12:35pm
Nemesis
Wed, Aug 7 | 12:40pm-1:50pm
Apeman
Wed, Aug 7 | 1:55pm-3:10pm
SCCMHunter
Wed, Aug 7 | 1:55pm-3:10pm
Snapback

Wed, Aug 7 | 11:25am-12:35pm
Nemesis

Location: Business Hall – Arsenal Station 5

Nemesis is an offensive data enrichment pipeline and operator support system. It ingests data from a variety of different offensive C2 frameworks and performs a number of automations and analytics on both downloaded files and different types of collected data. It aims to automate a number of repetitive tasks operators encounter on engagements, empower operators’ analytic capabilities and collective knowledge, and create structured and unstructured data stores of as much operational data as possible to help guide future research and facilitate offensive data analysis.

Learn More

Lee Christensen

SPEAKER

Lee Chagolla-Christensen

Security Researcher

Will Schroeder

SPEAKER

Will Schroeder

Security Researcher

Max Harley

SPEAKER

Max Harley

Consultant

DEF CON 32

SpecterOps at DEF CON 32: Sponsorships and Talks

SpecterOps is a proud sponsor of the Red Team Village! Dedicated to honing skills in critical thinking, collaboration, and strategic offensive security, the Red Team Village brings together information security professionals to share new tactics and techniques in offensive security.

Learn More
Thurs, Aug 8
9:00 AM – 1:00 PM
Offensive SCCM: Abusing Microsoft’s C2 Framework
Sat, Aug 10
1:00 pm – 2:50 pm
An Operator’s Guide: Hunting SCCM in the Real World
Sat, Aug 10
10:00 AM – 11:45 AM
Maestro (Demo Labs)

Location: Dean Martin Room, Las Vegas Convention Center

Microsoft Configuration Manager, formerly SCCM (System Center Configuration Manager), is a powerful technology used to deploy software to Windows systems in the majority of enterprise environments and has a high potential for abuse due to its privileged access to entire fleets of servers and workstation. In this workshop, students will be provided access to a live environment that reflects an enterprise SCCM deployment, gain an understanding of how the different components of SCCM interact, and learn how to execute recently discovered attack paths that can be used compromise SCCM clients, servers, and entire hierarchies. By completing both guided exercises and optional CTF challenges in this lab environment, students will learn how to demonstrate the impact of attack paths involving SCCM.

Learn More

Garret Foster

SPEAKER

Garrett Foster

Senior Consultant

duane michael

SPEAKER

Duane Michael

Managing Consultant

chris thompson

SPEAKER

Chris Thompson

Principal Consultant

get started
Defend Against Advanced Attacks