PinnedWill SchroederinPosts By SpecterOps Team MembersCertified Pre-OwnedActive Directory Certificate Services has a lot of attack potential!Jun 17, 20214Jun 17, 20214
Will SchroederinPosts By SpecterOps Team MembersNemesis 1.0.0In August of last year, @tifkin_, @0xdab0, and I released Nemesis, our offensive data enrichment platform. After lots of feedback…Apr 25Apr 25
Will SchroederinPosts By SpecterOps Team MembersSummoning RAGnarok With Your NemesisWith the explosion of large language model (LLM) use, everyone is rushing to apply LLMs to their specific industry and it’s the same for…Mar 13Mar 13
Will SchroederinPosts By SpecterOps Team MembersHacking With Your NemesisIn the first post in this series, On (Structured) Data, we talked about the gap area of offensive structured data and ended with the…Aug 9, 2023Aug 9, 2023
Will SchroederinPosts By SpecterOps Team MembersChallenges In Post-Exploitation WorkflowsIn our previous post, we talked about the problem of structured data in the post-exploitation community. We touched on the existing…Aug 2, 2023Aug 2, 2023
Will SchroederinPosts By SpecterOps Team MembersOn (Structured) DataIntroductionJul 26, 20231Jul 26, 20231
Will SchroederinPosts By SpecterOps Team MembersCertificates and Pwnage and Patches, Oh My!This post was written by Will Schroeder and Lee Christensen.Nov 9, 20223Nov 9, 20223
Will SchroederinPosts By SpecterOps Team MembersKoh: The Token StealerEdit 07/13/22: After an awesome back and forth with Clément Notin and @SteveSyfuhs on Twitter on the effects of “TokenLeakDetectDelaySecs”…Jul 7, 2022Jul 7, 2022
Will SchroederinPosts By SpecterOps Team MembersDeepPass — Finding Passwords With Deep LearningOne of the routine tasks operators regularly encounter on most engagements is data mining. While exactly what operators are after varies…Jun 1, 20223Jun 1, 20223
Will SchroederinPosts By SpecterOps Team MembersLearning Machine Learning Part 3: Attacking Black Box ModelsIn the first post in this series we covered a brief background on machine learning, the Revoke-Obfuscation approach for detecting…May 4, 20222May 4, 20222