Christopher RossinPosts By SpecterOps Team MembersSparkling PayloadsLeveraging Notarized Payloads and Sparkle for Initial AccessJul 27, 2020Jul 27, 2020
Christopher RossinPosts By SpecterOps Team MembersAudio Unit Plug-insLegitimate Un-signed Code ExecutionJul 13, 2020Jul 13, 2020
Christopher RossinPosts By SpecterOps Team MembersNo Place Like ChromeChrome extensions were first introduced to the public in December of 2009 and use HTML, JavaScript, and CSS to extend Chrome’s…Feb 8, 2019Feb 8, 2019
Christopher RossinPosts By SpecterOps Team MembersPersistent Credential Theft with Authorization PluginsCredential theft is often one of the first tactics leveraged by attackers once they’ve escalated privileges on a victim’s machine…Oct 17, 2018Oct 17, 2018
Christopher RossinPosts By SpecterOps Team MembersLoad & Execute Bundles with migrationToolMacOS contains several hundred native and signed libraries within the /System/Library/PrivateFrameworks directory. Apple provides little…May 25, 2018May 25, 2018
Christopher RossinPosts By SpecterOps Team MembersMalicious Installer PluginsIn 2017, Patrick Wardle tweeted something that really piqued my interest:Feb 9, 2018Feb 9, 2018
Christopher RossinPosts By SpecterOps Team MembersLeveraging Emond on macOS For PersistenceNOTE: This binary was described in the recently released, “*OS Internals, Volume I, User Space” textbook by Jonathan Levin. This book has…Jan 18, 2018Jan 18, 2018