InPosts By SpecterOps Team MembersbyDuane MichaelLife at SpecterOps Part II: From Dream to RealityWe’re hiring consultants; Check out this overview of our recruiting process!1d ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 11, 20242
InPosts By SpecterOps Team MembersbyAdam ChesterADFS — Living in the Legacy of DRSIt’s no secret that Microsoft have been trying to move customers away from ADFS for a while. Short of slapping a “deprecated” label on it…Jan 7Jan 7
Giulio PierantoniTargeted Timeroasting: Stealing User Hashes With NTPDomain admins can manipulate user attributes to obtain MS-SNTP hashes for accounts other than computers. This can be used as an alternative…1d ago1d ago
InEnrique DansbyEnrique DansWhen companies move fast, they do more than break thingsThe expression is attributed to Mark Zuckerberg in the early days of Facebook, and referred to a culture in which technical excellence…Nov 8, 20238Nov 8, 20238
InPosts By SpecterOps Team MembersbyDuane MichaelLife at SpecterOps Part II: From Dream to RealityWe’re hiring consultants; Check out this overview of our recruiting process!1d ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 11, 20242
InPosts By SpecterOps Team MembersbyAdam ChesterADFS — Living in the Legacy of DRSIt’s no secret that Microsoft have been trying to move customers away from ADFS for a while. Short of slapping a “deprecated” label on it…Jan 7
Giulio PierantoniTargeted Timeroasting: Stealing User Hashes With NTPDomain admins can manipulate user attributes to obtain MS-SNTP hashes for accounts other than computers. This can be used as an alternative…1d ago
InEnrique DansbyEnrique DansWhen companies move fast, they do more than break thingsThe expression is attributed to Mark Zuckerberg in the early days of Facebook, and referred to a culture in which technical excellence…Nov 8, 20238
r1ckyr3c0nHavoc C2 Framework Part 1: Installation (2024)After using Cobalt Strike in the Red Team Ops (RTO) course, I wanted to see what open-source Command and Control (C2) frameworks were…Jan 5, 20241
Mike CvetYour Product is an Abuse VectorOutputs of the consumer Internet product development process are launched into consistently adversarial online environments.Jul 16, 20231