_nullbind's profile picture. Security Researcher @NetSPI | PowerUpSQL Author

Scott Sutherland

@_nullbind

Security Researcher @NetSPI | PowerUpSQL Author

Scott Sutherland repostou

📢 New Chapter: #MicrosoftEntra Attack & Defense Playbook ☁️ 🔑 @samilamppu and I have focused on Application-based Authentication (ABA) in #EntraConnect. Huge thanks to @DrAzureAD and @RobbeVdDaele for reviewing. Check out the new chapter: github.com/Cloud-Architek…

Thomas_Live's tweet image. 📢 New Chapter: #MicrosoftEntra Attack & Defense Playbook ☁️ 🔑 
@samilamppu and I have focused on Application-based Authentication (ABA) in #EntraConnect. Huge thanks to @DrAzureAD and @RobbeVdDaele for reviewing.
Check out the new chapter:
github.com/Cloud-Architek…
Thomas_Live's tweet image. 📢 New Chapter: #MicrosoftEntra Attack & Defense Playbook ☁️ 🔑 
@samilamppu and I have focused on Application-based Authentication (ABA) in #EntraConnect. Huge thanks to @DrAzureAD and @RobbeVdDaele for reviewing.
Check out the new chapter:
github.com/Cloud-Architek…
Thomas_Live's tweet image. 📢 New Chapter: #MicrosoftEntra Attack & Defense Playbook ☁️ 🔑 
@samilamppu and I have focused on Application-based Authentication (ABA) in #EntraConnect. Huge thanks to @DrAzureAD and @RobbeVdDaele for reviewing.
Check out the new chapter:
github.com/Cloud-Architek…
Thomas_Live's tweet image. 📢 New Chapter: #MicrosoftEntra Attack & Defense Playbook ☁️ 🔑 
@samilamppu and I have focused on Application-based Authentication (ABA) in #EntraConnect. Huge thanks to @DrAzureAD and @RobbeVdDaele for reviewing.
Check out the new chapter:
github.com/Cloud-Architek…

Scott Sutherland repostou

Added CRED-8 to Misconfiguration Manager, which is @unsigned_sh0rt's MP relay to dump machine policy secrets. MM link: github.com/subat0mik/Misc… Blog link: specterops.io/blog/2025/07/1…


Scott Sutherland repostou

Lots of cool new Nemesis features merging in soon from @tifkin_ and I! Development definitely didn't stop with the 2.0 release :) github.com/SpecterOps/Nem…


Scott Sutherland repostou

Last week we covered Active Directory Group Policy permissions (x.com/PyroTek3/statu…). This week, we dig into Active Directory Kerberos delegation. I have mentioned in several presentations that Kerberos delegation is impersonation. Kerberos delegation is used when a service…

PyroTek3's tweet image. Last week we covered Active Directory Group Policy permissions (x.com/PyroTek3/statu…).

This week, we dig into Active Directory Kerberos delegation. I have mentioned in several presentations that Kerberos delegation is impersonation. Kerberos delegation is used when a service…
PyroTek3's tweet image. Last week we covered Active Directory Group Policy permissions (x.com/PyroTek3/statu…).

This week, we dig into Active Directory Kerberos delegation. I have mentioned in several presentations that Kerberos delegation is impersonation. Kerberos delegation is used when a service…
PyroTek3's tweet image. Last week we covered Active Directory Group Policy permissions (x.com/PyroTek3/statu…).

This week, we dig into Active Directory Kerberos delegation. I have mentioned in several presentations that Kerberos delegation is impersonation. Kerberos delegation is used when a service…

Recently, we looked at Active Directory built-in groups (x.com/PyroTek3/statu…) This week, we focus on Active Directory Group Policy Objects (GPOs). GPOs should be audited regularly to identify the configured owner as well as the permissions to ensure they are appropriate. In…

PyroTek3's tweet image. Recently, we looked at Active Directory built-in groups (x.com/PyroTek3/statu…)

This week, we focus on Active Directory Group Policy Objects (GPOs). GPOs should be audited regularly to identify the configured owner as well as the permissions to ensure they are appropriate. In…


Scott Sutherland repostou

During my #BHUSA talk I've released many ETW research tools, of which the most notable is BamboozlEDR. This tool allows you to inject events into ETW, allowing you to generate fake alerts and blind EDRs. github.com/olafhartong/Ba… Slides available here: github.com/olafhartong/Pr…


Scott Sutherland repostou

👋 Say hello to Nemesis 2.0, a streamlined, Docker Compose-based platform that is laser-focused on file triage. After introducing v1 two years ago, the team has reworked the platform to better serve what people need from it. Read more from @harmj0y. ⤵️ ghst.ly/4mxQzFU


Scott Sutherland repostou

In our latest blog, @shncldwll breaks down the process of creating a fully integrated, self-verifying agentic system that can do modern Windows Active Directory red team operations, without human interaction. Read about our approach to building cyber evals to measure model…

dreadnode's tweet image. In our latest blog, @shncldwll breaks down the process of creating a fully integrated, self-verifying agentic system that can do modern Windows Active Directory red team operations, without human interaction.

Read about our approach to building cyber evals to measure model…

Scott Sutherland repostou

Your devs aren’t just writing code, they’re holding keys to your kingdom. BloodHound now supports GitHub identities, so you can visualize access and control in your org’s dev pipeline. Check it out at github.com/SpecterOps/Git…

jaredcatkinson's tweet image. Your devs aren’t just writing code, they’re holding keys to your kingdom.

BloodHound now supports GitHub identities, so you can visualize access and control in your org’s dev pipeline.

Check it out at github.com/SpecterOps/Git…

Scott Sutherland repostou

I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it! - github.com/SpecterOps/MSS… - specterops.io/blog/2025/07/2…

_Mayyhem's tweet image. I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it!
- github.com/SpecterOps/MSS…
- specterops.io/blog/2025/07/2…

Scott Sutherland repostou

Get to know what's new w/ SCCMHunter. Join @unsigned_sh0rt's #BHUSA Arsenal session on the post-exploitation tool & learn about the updates, including site system profiling, extended admin modules, & credential relaying capabilities. ghst.ly/3GkhpBV

SpecterOps's tweet image. Get to know what's new w/ SCCMHunter.

Join @unsigned_sh0rt's #BHUSA Arsenal session on the post-exploitation tool & learn about the updates, including site system profiling, extended admin modules, & credential relaying capabilities. ghst.ly/3GkhpBV

Scott Sutherland repostou

NetSPI Principal Security Consultant Jason Juntunen recently published findings on a Remote Code Execution vulnerability in SailPoint's IQService component. 👉 Read the full technical breakdown: ow.ly/GbT150WmgRg #proactivesecurity #VulnerabilityResearch

NetSPI's tweet image. NetSPI Principal Security Consultant Jason Juntunen recently published findings on a Remote Code Execution vulnerability in SailPoint's IQService component.

👉 Read the full technical breakdown: ow.ly/GbT150WmgRg

#proactivesecurity #VulnerabilityResearch

Scott Sutherland repostou

Happy Friday! @tifkin_ and I are happy to announce that we have cut the release for Nemesis 2.0.0 - check out the CHANGELOG for a (brief) summary of changes, and dive into our new docs for more detail! We're extremely proud and excited for this release github.com/SpecterOps/Nem…


Scott Sutherland repostou

Including nice tool release 🔥 github.com/temp43487580/E…

Compromising Entra joined devices with P2P certificate authentication by @TEMP43487580 👀👌

ShitSecure's tweet image. Compromising Entra joined devices with P2P certificate authentication by @TEMP43487580 👀👌


Scott Sutherland repostou

Super interesting blog on how to automate some MS-RPC research 🧐 incendium.rocks/posts/Automati…


Scott Sutherland repostou

I publish two blog posts today! 📝🐫  The first dives into how we're improving the way BloodHound models attack paths through AD trusts: specterops.io/blog/2025/06/2…  The second covers an attack technique I came across while exploring AD trust abuse: specterops.io/blog/2025/06/2…


Scott Sutherland repostou

Tokenizing has dropped in Rigging. Train models in-line with LLM interactions, tools calls, and metrics. 👀 github.com/dreadnode/rigg…


Scott Sutherland repostou

Thank you so much to @x33fcon and its organizers for an awesome experience! @tifkin_ and I had a blast talking about the new Nemesis 2.0 rewrite (code live at github.com/SpecterOps/Nem… !) and hope to be back next year #x33fcon


Scott Sutherland repostou

One Tool To Rule Them All AMSI, CLM and ETW – defeated* with one Microsoft signed tool by someone called Ian shells.systems/one-tool-to-ru…

cyb3rops's tweet image. One Tool To Rule Them All

AMSI, CLM and ETW – defeated* with one Microsoft signed tool

by someone called Ian

shells.systems/one-tool-to-ru…

Scott Sutherland repostou

I'm doing a talk at BSidesLV on this, but I'm dropping the research early, discovered this in 2022, and releasing now for awareness, how to decrypt F5 Service Account Passwords Standalone tool github.com/evilmog/F5-Dec…


Scott Sutherland repostou

Deception isn’t fluff… it’s friction. And friction slows attackers down, gives defenders an edge, and buys you time. The whole point is to make them second guess their actions, make them have to perform more actions and hopefully increase the chances of detection


Loading...

Something went wrong.


Something went wrong.