psionicjake's profile picture. Security hardening 🛡️| Making AD and Azure bulletproof 🕸️ | Computer nerd, security hobbyist, gamer, “I prefer to be called a hacker”

Jacob Jackson

@psionicjake

Security hardening 🛡️| Making AD and Azure bulletproof 🕸️ | Computer nerd, security hobbyist, gamer, “I prefer to be called a hacker”

Jacob Jackson reposted

SCCM attack paths are messy until you can see them. 👀 ConfigManBearPig from @_Mayyhem extends BloodHound with SCCM nodes + edges using OpenGraph, plus queries to surface hierarchy takeovers and escalation paths. Check it out! ghst.ly/4svbcWO


Jacob Jackson reposted

Hi friends! I've finally written the third part of the Impacket Programming Guide! We explored several MSRPC protocols and also created our own tool for Lateral Movement! Read on medium: medium.com/@cicada-8/impa… POC: github.com/CICADA8-Resear…

CICADA8Research's tweet image. Hi friends! I've finally written the third part of the Impacket Programming Guide! We explored several MSRPC protocols and also created our own tool for Lateral Movement! Read on medium:

medium.com/@cicada-8/impa…

POC: github.com/CICADA8-Resear…

Jacob Jackson reposted

Leveraging program entry points for process injection in Windows (2023) bohops.com/2023/06/09/no-… Credits @bohops #infosec #Windows

0xor0ne's tweet image. Leveraging program entry points for process injection in Windows (2023)

bohops.com/2023/06/09/no-…

Credits @bohops

#infosec #Windows

Jacob Jackson reposted

SCOM is one of the most deployed, but least researched, System Center products. @synzack21 breaks down how it works + how to build a lab to test new tradecraft. ghst.ly/4prZMRI


Jacob Jackson reposted

A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses the traditional endpoint mapper requirement by using SMB directly.…


Jacob Jackson reposted

Attackers don’t exploit tools—they exploit identities. Learn how to defend where it matters. Join operators and defenders for one of our hands-on training courses at #SOCON2026. In-person attendees also receive a free conference pass. Save your spot ➡️ ghst.ly/socon-2026

SpecterOps's tweet image. Attackers don’t exploit tools—they exploit identities. Learn how to defend where it matters. Join operators and defenders for one of our hands-on training courses at #SOCON2026.

In-person attendees also receive a free conference pass. Save your spot ➡️ ghst.ly/socon-2026

Jacob Jackson reposted

SCCM is one of the most relied-on enterprise tools, but that legacy comes with risk. Join @unsigned_sh0rt this Friday at #BSidesPDX as he discusses how attackers can abuse #SCCM Entra integrations to gain admin access. ➡️ ghst.ly/3L4nkwG

SpecterOps's tweet image. SCCM is one of the most relied-on enterprise tools, but that legacy comes with risk.

Join @unsigned_sh0rt this Friday at #BSidesPDX as he discusses how attackers can abuse #SCCM Entra integrations to gain admin access. 

➡️ ghst.ly/3L4nkwG

Loading...

Something went wrong.


Something went wrong.