PinnedWill SchroederinPosts By SpecterOps Team MembersCertified Pre-OwnedActive Directory Certificate Services has a lot of attack potential!22 min read·Jun 17, 2021--4--4
Will SchroederinPosts By SpecterOps Team MembersNemesis 1.0.0In August of last year, @tifkin_, @0xdab0, and I released Nemesis, our offensive data enrichment platform. After lots of feedback…9 min read·Apr 25, 2024----
Will SchroederinPosts By SpecterOps Team MembersSummoning RAGnarok With Your NemesisWith the explosion of large language model (LLM) use, everyone is rushing to apply LLMs to their specific industry and it’s the same for…13 min read·Mar 13, 2024----
Will SchroederinPosts By SpecterOps Team MembersHacking With Your NemesisIn the first post in this series, On (Structured) Data, we talked about the gap area of offensive structured data and ended with the…18 min read·Aug 9, 2023----
Will SchroederinPosts By SpecterOps Team MembersChallenges In Post-Exploitation WorkflowsIn our previous post, we talked about the problem of structured data in the post-exploitation community. We touched on the existing…13 min read·Aug 2, 2023----
Will SchroederinPosts By SpecterOps Team MembersOn (Structured) DataIntroduction9 min read·Jul 26, 2023--1--1
Will SchroederinPosts By SpecterOps Team MembersCertificates and Pwnage and Patches, Oh My!This post was written by Will Schroeder and Lee Christensen.16 min read·Nov 9, 2022--3--3
Will SchroederinPosts By SpecterOps Team MembersKoh: The Token StealerEdit 07/13/22: After an awesome back and forth with Clément Notin and @SteveSyfuhs on Twitter on the effects of “TokenLeakDetectDelaySecs”…11 min read·Jul 7, 2022----
Will SchroederinPosts By SpecterOps Team MembersDeepPass — Finding Passwords With Deep LearningOne of the routine tasks operators regularly encounter on most engagements is data mining. While exactly what operators are after varies…12 min read·Jun 1, 2022--3--3
Will SchroederinPosts By SpecterOps Team MembersLearning Machine Learning Part 3: Attacking Black Box ModelsIn the first post in this series we covered a brief background on machine learning, the Revoke-Obfuscation approach for detecting…24 min read·May 4, 2022--2--2