_logangoins's profile picture. Adversary Simulation @SpecterOps

Logan Goins

@_logangoins

Adversary Simulation @SpecterOps

固定されたツイート

I Just documented a cool way to authenticate proxied tooling to LDAP in an AD environment using C2 payload auth context, without stealing any tickets or hashes! Keep tooling execution off-host and away from EDR on your Red Team assessments! specterops.io/blog/2025/08/2…


Logan Goins さんがリポスト

The CFP for #SOCON2026 is OPEN! 🙌 Have you been working on something interesting in Attack Path Management or identity-first defense? Join us in Arlington, VA (April 13–14) and share your work with the community. Submit your talk by Nov. 15 → ghst.ly/socon26-cfp

SpecterOps's tweet image. The CFP for #SOCON2026 is OPEN! 🙌

Have you been working on something interesting in Attack Path Management or identity-first defense? Join us in Arlington, VA (April 13–14) and share your work with the community.

Submit your talk by Nov. 15 → ghst.ly/socon26-cfp

Logan Goins さんがリポスト

What happens when the User-Account-Restrictions property gets misconfigured? Spoiler: It's not good. From account compromise to full domain takeover, @unsigned_sh0rt breaks down why this permission set is more dangerous than most realize. ghst.ly/4mKgycH


Logan Goins さんがリポスト

Finally releasing Sekken-Enum, an ADWS enumeration BOF we've been using internally for a while now. Based on the research from SOAPHound/SoaPy moving away from relying on .NET execution or proxying. Output works with BOFHound for Bloodhound ingesting. github.com/Nomad0x7/sekke…


Logan Goins さんがリポスト

Whether you’re blue team or red team, Adversary Tactics: Detection at Specter Bash gives you hands-on experience dissecting offensive tradecraft and building quality detections - with new labs on identity-driven detection engineering and attack path analysis.

Move beyond signature-based detection to catch what traditional defenses miss. Our Detection course at Specter Bash next week will teach you to engineer detections based on adversary TTPs & behavioral analysis. There's still time to save your spot! 👉 lnkd.in/eP58JqcU

SpecterOps's tweet image. Move beyond signature-based detection to catch what traditional defenses miss. Our Detection course at Specter Bash next week will teach you to engineer detections based on adversary TTPs & behavioral analysis.

There's still time to save your spot! 👉 lnkd.in/eP58JqcU


Logan Goins さんがリポスト

Lateral movement getting blocked by traditional methods? @werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG

specterops.io

DCOM Again: Installing Trouble - SpecterOps

DCOM lateral movement BOF using Windows Installer (MSI) Custom Action Server - install ODBC drivers to load and execute DLLs


Logan Goins さんがリポスト

Fact: Remote service and scheduled task creation bypass firewalls on DCs and Win file servers because of SMB tunnelling. Solution: Create RPC filters that block MS-SCMR and MS-TSCH over named pipes. The latter has 3 UUIDs, so blocking the atsvc pipe is more elegant. #DSInternals

MGrafnetter's tweet image. Fact: Remote service and scheduled task creation bypass firewalls on DCs and Win file servers because of SMB tunnelling.
Solution: Create RPC filters that block MS-SCMR and MS-TSCH over named pipes. The latter has 3 UUIDs, so blocking the atsvc pipe is more elegant. #DSInternals
MGrafnetter's tweet image. Fact: Remote service and scheduled task creation bypass firewalls on DCs and Win file servers because of SMB tunnelling.
Solution: Create RPC filters that block MS-SCMR and MS-TSCH over named pipes. The latter has 3 UUIDs, so blocking the atsvc pipe is more elegant. #DSInternals

Logan Goins さんがリポスト

Added CRED-8 to Misconfiguration Manager, which is @unsigned_sh0rt's MP relay to dump machine policy secrets. MM link: github.com/subat0mik/Misc… Blog link: specterops.io/blog/2025/07/1…


Logan Goins さんがリポスト

Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM. github.com/trustedsec/Tit…


Logan Goins さんがリポスト

Better late than never. I wrote a post that analyzes the Salesloft-Drift breach in the context of Attack Paths. specterops.io/blog/2025/09/2… My main takeaways: 1) Hybrid paths are not limited to two platforms owned by the same organization 2) Ad-hoc paths arise when passwords are…


Logan Goins さんがリポスト

Excited to present with @breakfix at #BHEU @BlackHatEvents where we'll be sharing our research on attacking System Center Operations Manager! @SpecterOps

unsigned_sh0rt's tweet image. Excited to present with @breakfix  at #BHEU @BlackHatEvents  where we'll be sharing our research on attacking System Center Operations Manager! 
@SpecterOps

Logan Goins さんがリポスト

BloodHound's OpenGraph is 🔥🚀 This is how we rapidly developed a customer specific attack primitive for BloodHound that we call "ManagerOf" 👇

New #BloodHoundBasics post from @martinsohndk‼️ Today is a demo of how BloodHound's #OpenGraph helped a customer build ManagerOfHound.ps1 - going from attack path concept to a custom "ManagerOf" edge in BloodHound. Can it fit in a thread? Let's see... 🧵 1/6

SpecterOps's tweet image. New #BloodHoundBasics post from @martinsohndk‼️ 

Today is a demo of how BloodHound's #OpenGraph helped a customer build ManagerOfHound.ps1 - going from attack path concept to a custom "ManagerOf" edge in BloodHound. Can it fit in a thread? Let's see... 

🧵 1/6


Logan Goins さんがリポスト

I came across a WMI Win_32 Process replacement with some extra useful functionality. specterops.io/blog/2025/09/1…


Logan Goins さんがリポスト

Proud to have you here @bohops & Dylan Tran #mcttp #hansesecure #meetfriends #itsecurity @HanseSecure

CyberWarship's tweet image. Proud to have you here
@bohops & Dylan Tran

#mcttp #hansesecure #meetfriends #itsecurity

@HanseSecure

Logan Goins さんがリポスト

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…


Logan Goins さんがリポスト

Even with HTTPS, Windows Server Update Services can be abused if attackers obtain a trusted certificate, allowing authentication relay. In our blog, @Coontzy1 explains how WSUS traffic can be found and abused, and what sparked his investigation. Read now! trustedsec.com/blog/wsus-is-s…


Logan Goins さんがリポスト

ICYMI: SO-CON is returning to Arlington, VA! #SOCON2026 will be bigger than before with a new third talk track. 🧑‍🏫 Conference: April 13-14, 2026 💻 Training: April 15-18, 2026 Sign up now to receive updates → specterops.io/so-con/


Logan Goins さんがリポスト

We are back with our BloodHound t-shirt fundraiser! 🙌 Grab your BloodHound 8.0 shirt today. All funds raised will go directly to @HopeforHIE, the global voice for families affected by Hypoxic Ischemic Encephalopathy. 👕: ghst.ly/bh8-tshirt

SpecterOps's tweet image. We are back with our BloodHound t-shirt fundraiser! 🙌

Grab your BloodHound 8.0 shirt today. All funds raised will go directly to @HopeforHIE, the global voice for families affected by Hypoxic Ischemic Encephalopathy.

👕: ghst.ly/bh8-tshirt

Logan Goins さんがリポスト

knew win10 had the dsquery.dll laying around but never knew what to do with it "rundll32.exe dsquery.dll OpenQueryWindow" will pop open a console for you and you can do some light LDAP recon you can also open with with win + ctrl + f probably useful for VDI/Citrix type tests

unsigned_sh0rt's tweet image. knew win10 had the dsquery.dll laying around but never knew what to do with it

"rundll32.exe dsquery.dll OpenQueryWindow" will pop open a console for you and you can do some light LDAP recon

you can also open with with win + ctrl + f

probably useful for VDI/Citrix type tests

Logan Goins さんがリポスト

There's no one-size-fits-all C2 framework. That's why @its_a_feature_ spent 7 years building Mythic, & learning lessons along the way. Join Cody at @MCTTP_Con, where he will share the tips & tricks every red teamer needs to hear. Learn more: ghst.ly/4mGUBw2

SpecterOps's tweet image. There's no one-size-fits-all C2 framework.

That's why @its_a_feature_ spent 7 years building Mythic, & learning lessons along the way. Join Cody at @MCTTP_Con, where he will share the tips & tricks every red teamer needs to hear.

Learn more: ghst.ly/4mGUBw2

United States トレンド

Loading...

Something went wrong.


Something went wrong.