SpecterOps
SpecterOps
  • 157
  • 246 790
Ghosts on the Node - Will Pearce & Nick Landers [SO-CON 2024]
2023 was a breakthrough year for all things Machine Learning, especially for generative use cases. The community saw models and frameworks released at a blistering pace thanks to innovative solutions to fit LLMs onto smaller and smaller devices (LoRA, PEFT, etc). The industry saw the rise of risk assessment frameworks and legislative actions, leading to new requirements for organizations to follow.
Our talk will cover various pairing of these state of the art (SOTA) models and techniques with the traditional security and identity tools like Bloodhound, Seatbelt, and Mythic. We’ll introduce the framework of “Offensive ML” as a discipline and work to use machine learning to support better security solutions. AI promises massive change across cybersecurity, but rather than speculate in the abstract, we’ll focus on practical solutions and demonstrations.
Переглядів: 158

Відео

Building Our Nemesis
Переглядів 46814 днів тому
This webinar delves into the recent release of Nemesis 1.0, our offensive-focused data enrichment pipeline years in the making. Nemesis aims to unify all post-exploitation data from offensive engagements in order to improve operator workflows, provide tradecraft assistance, and uncover new data-driven research opportunities. The presenters cover various red team challenges that influenced Nemes...
No Cert? No Problem - ClickOnce (Ab)Use for Trusted Code Execution
Переглядів 23214 днів тому
Initial access payloads have historically had limited methods that work seamlessly in phishing campaigns and can maintain a level of evasion. This payload category has been dominated by Microsoft Office types, but as recent news has shown, the lifespan of even this technique is shortening. A vehicle for payload delivery that has been greatly overlooked for initial access is ClickOnce. ClickOnce...
Analyzing and Executing ADCS Attack Paths with BloodHound- Andy Robbins & Jonas Knudsen[SO-CON 2024]
Переглядів 18514 днів тому
Active Directory Certificate Services (ADCS) is Microsoft’s native PKI solution, used by many organizations to facilitate smart card authentication, TLS certificate issuance and verification, code signing, and other tasks. ADCS is a complicated system with many moving parts and possible configurations, out of which privilege escalation opportunities often emerge. Discovering those opportunities...
KubeHound and Beyond: Evolving Security Through Graphs & Automation - Jeremy Fox [SO-CON 2024]
Переглядів 22414 днів тому
The attack surface within modern cloud-native organisations is vast, with often tens or hundreds of thousands of application instances. Understanding interdependencies in a system of this scale, in particular gaps left open by seemingly innocent configuration changes, is beyond human capability. As such, the current mental model of defense remains list-based; attempting to identify vulnerable c...
Misconfiguration Manager: Overlooked and Overprivileged- Duane Michael & Chris Thompson[SO-CON 2024]
Переглядів 23114 днів тому
Configuration Manager (SCCM) attack paths have become more and more common recently. The impact of these attack paths is significant, as they often directly lead to domain compromise, else enable it. In this talk we discuss some of the most critical and common SCCM attack paths we've discovered and abused in the wild and how to best mitigate and manage them. Additionally, we introduce a model f...
The BloodHound Enterprise State of Attack Path Management - Justin Kohler [SO-CON 2024]
Переглядів 12714 днів тому
Three years after we published the Attack Path Management Manifesto, BloodHound Enterprise (BHE) has become a cornerstone of the Identity security strategy for hundreds of organizations, uncovering and mitigating billions of Attack Paths in the process. Join this session to delve into the practical insights gained from real-world deployments and explore leading practices for managing Identity A...
Beyond the Shell: Unconventional Agents for Red Teaming Success - Cody Thomas [SO-CON 2024]
Переглядів 77114 днів тому
In this presentation, we delve into the uncharted territories of offensive security using the Mythic C2 platform. Moving beyond traditional red teaming approaches, we explore unconventional agents that redefine how operators interact with target environments. Discover the power of remotely controlling webshells seamlessly alongside beaconing agents from a unified interface, and the creation of ...
Manually Enumerating AD Attack Paths with BOFHound - Matt Creel & Adam Brown [SO-CON 2024]
Переглядів 20314 днів тому
Manually Enumerating AD Attack Paths with BOFHound - Matt Creel & Adam Brown [SO-CON 2024]
Identity Providers for Red Teamers - Adam Chester [SO-CON 2024]
Переглядів 1,8 тис.14 днів тому
It’s rare to find organisations who haven’t dipped their toe into the world of cloud-based Identity Providers. Whether it’s Okta, Ping, Entra ID, or the myriad of other providers gaining traction, the days of managing federated identities with on-premises solutions like ADFS are fading, instead replaced by third party services offering to offload the burden of securing the gates to critical ass...
Attack Path Based Detection Engineering: Leveraging BloodHound for Ro... -Olaf Hartong [SO-CON 2024]
Переглядів 98114 днів тому
Dive deep into the world of BloodHound, a tool that has revolutionized the way we identify and analyze attack paths. Despite its benefits, we encounter many teams that struggle to maximize its potential due to time constraints or knowledge gaps. This talk aims to bridge these gaps, unveiling tips and tricks to keep your BloodHound database up-to-date and use it for automatic detection and enric...
Graphs are Hard - John Hopper & Rohan Vazarkar [SO-CON 2024]
Переглядів 18614 днів тому
Security domains like Microsoft Entra, Active Directory, AWS IAM and others are highly complex and difficult to examine. BloodHound is a tool that utilizes graph constructs to make these domains easier to reason with to shorten time to discovery of interesting attack vectors. Throughout SpecterOps' journey in producing BloodHound with a focus on Attack Path Management there have been many engin...
LSA Whisperer - Evan McBroom [SO-CON 2024]
Переглядів 18914 днів тому
Accessing LSASS memory has been a common goal for attackers due to its management of user credential material. Microsoft has added multiple features to Windows to make gaining such access more difficult including Credential Guard, Remote Credential Guard, and Protected Processes Light (PPL). These features are helpful but irrelevant if an attacker is able to request credentials from the LSA dir...
The Dog Ate My Homework... (re)Building a PowerShell module for the... - JD Douillard [SO-CON 2024]
Переглядів 11014 днів тому
BloodHound has been my faithful companion for some years now, so I was really excited when the BloodHound team announced the release of the new BloodHound Community Edition earlier last year… but then I quickly realized most of the custom BloodHound tooling I had built over the years wouldn't work anymore in the new BloodHound version. Past a moment of despair, and rather than trying to adapt m...
Domain Persistence: Detection, Triage, and Recovery - Josh Prager & Nico Shyne [SO-CON 2024]
Переглядів 52514 днів тому
We'll dive into Active Directory domain persistence techniques focused on identifying attacks and reclaiming control over organizational domains after a breach. The presentation explores various advanced adversarial techniques such as credential theft on domain controllers, NTDS access, DCSync, and the creation of Golden and Diamond Tickets. It emphasizes the importance of detecting these metho...
2023 SANS SOC Survey Review: Highlights and Deep Dive - Christopher Crowley [SO-CON 2024]
Переглядів 9914 днів тому
2023 SANS SOC Survey Review: Highlights and Deep Dive - Christopher Crowley [SO-CON 2024]
Project Apeman: Mapping AWS Identity Attack Paths - Daniel Heinsen [SO-CON 2024]
Переглядів 17914 днів тому
Project Apeman: Mapping AWS Identity Attack Paths - Daniel Heinsen [SO-CON 2024]
The New SaaS Cyber Kill Chain - Luke Jennings [SO-CON 2024]
Переглядів 29614 днів тому
The New SaaS Cyber Kill Chain - Luke Jennings [SO-CON 2024]
Attack Path Management, the BloodHound Enterprise Way (May 23, 2024)
Переглядів 23121 день тому
Attack Path Management, the BloodHound Enterprise Way (May 23, 2024)
BloodHound Update: Spring 2024
Переглядів 237Місяць тому
BloodHound Update: Spring 2024
Auditing Kerberoastable Accounts
Переглядів 285Місяць тому
Auditing Kerberoastable Accounts
Attack Path Management, the BloodHound Enterprise Way
Переглядів 297Місяць тому
Attack Path Management, the BloodHound Enterprise Way
Defining the Undefined: What is Tier Zero Part III
Переглядів 4782 місяці тому
Defining the Undefined: What is Tier Zero Part III
Domain Persistence: Detection, Triage, and Recovery
Переглядів 8743 місяці тому
Domain Persistence: Detection, Triage, and Recovery
Microsoft Breach: What Happened? What Should Azure Admins Do?
Переглядів 6 тис.5 місяців тому
Microsoft Breach: What Happened? What Should Azure Admins Do?
AD CS Attack Paths in BloodHound
Переглядів 2,8 тис.6 місяців тому
AD CS Attack Paths in BloodHound
BloodHound Update: Fall 2023
Переглядів 4497 місяців тому
BloodHound Update: Fall 2023
BloodHound Enterprise | Attack Path Management for All
Переглядів 1,7 тис.7 місяців тому
BloodHound Enterprise | Attack Path Management for All
Defining the Undefined: What is Tier Zero Part II
Переглядів 6849 місяців тому
Defining the Undefined: What is Tier Zero Part II
A Tour of BloodHound Community Edition
Переглядів 3 тис.9 місяців тому
A Tour of BloodHound Community Edition

КОМЕНТАРІ

  • @SrRunsis
    @SrRunsis День тому

    Awesome talk! There should be a 2024 version now

  • @AsdZxc-sj9sd
    @AsdZxc-sj9sd 12 днів тому

    Wow amazing

  • @JWieg
    @JWieg 14 днів тому

    Thanks for posting. 🎉 very interesting

  • @anirbandas6257
    @anirbandas6257 15 днів тому

    amazing work!

  • @JWieg
    @JWieg 16 днів тому

    Great talk. Thank you. 🎉

  • @djhohnstein
    @djhohnstein 18 днів тому

    first.

  • @jerryxie777
    @jerryxie777 2 місяці тому

    So you really don't think anyone can totally understand kerberos will watch your video😂😅😊

  • @computerb0y27
    @computerb0y27 2 місяці тому

    still relevant and good!

  • @Dandelionq
    @Dandelionq 2 місяці тому

    Answer me people cos im stuck

  • @Dandelionq
    @Dandelionq 2 місяці тому

    It didnt generate password

    • @Dandelionq
      @Dandelionq 2 місяці тому

      What im supposed to do

  • @somnathdeb4109
    @somnathdeb4109 2 місяці тому

    Everything is fine..also kindly tell us to remove this whole neo4j server from our system?

  • @eointhomas2914
    @eointhomas2914 3 місяці тому

    Really enjoyed this vid, I manage some Azure Tenants and all cloud providers are a whole discipline in themselves, so much to look over and keep an eye on

  • @devkaushik9618
    @devkaushik9618 3 місяці тому

    Learned a lot! Thanks

  • @z0mn1a
    @z0mn1a 4 місяці тому

    Make content losers.

  • @prisccaviana
    @prisccaviana 4 місяці тому

    Man...I had a blast! thank you so much for your brilliant explanation Andy! keep coming!

    • @robbinsandy
      @robbinsandy 4 місяці тому

      It's my pleasure, thank you for watching. I hope the information was useful.

  • @ashr_
    @ashr_ 4 місяці тому

    Best OS C2 in 2024. Thank you Cody and SpecterOps.

  • @erilycus
    @erilycus 4 місяці тому

    Great stuff, got useful for personal project

  • @faanross
    @faanross 4 місяці тому

    oh man this is pure gold thanks!!

  • @JWieg
    @JWieg 5 місяців тому

    thanks guys. very very comprehensive overview

    • @robbinsandy
      @robbinsandy 4 місяці тому

      It's our pleasure, thank you for watching

  • @DaveAitel
    @DaveAitel 5 місяців тому

    Having an AUDIENCE for this video that asks questions and clarifies things is GREAT.

    • @robbinsandy
      @robbinsandy 4 місяці тому

      Thank you for that feedback, Dave, and thank you for watching our video

  • @DaveAitel
    @DaveAitel 5 місяців тому

    For next video would appreciate it for us old ppl that you have a SLIGHTLY BIGGER terminal font :)

    • @robbinsandy
      @robbinsandy 4 місяці тому

      Thank you for that note, Dave, I will make sure terminals are easily legible the next time we make a video

  • @user-zr5ts2qd4h
    @user-zr5ts2qd4h 5 місяців тому

    Great Stuff. Do you have a discord link or Telegram?

    • @specterops
      @specterops 5 місяців тому

      We are not on Discord or Telegram. You can follow us on: X: twitter.com/SpecterOps LinkedIn: www.linkedin.com/company/specterops Mastodon: infosec.exchange/@SpecterOps You can also join the conversation on our BloodHound Gang Slack channel at ghst.ly/BHSlack

  • @josephtillman8639
    @josephtillman8639 5 місяців тому

    Can you elaborate on what you said at 30:55, that disabling user consent would not have prevented SVR from granting consent to the malicious OAuth applications?

    • @robbinsandy
      @robbinsandy 5 місяців тому

      This is regarding the attack path step that Microsoft describes as: "They created a new user account to grant consent in the Microsoft corporate environment to the actor controlled malicious OAuth applications." This is a great question because it may seem as if disabling users' ability to consent to foreign applications would have stopped the attack path in its tracks. But the very next statement Microsoft makes is this: "The threat actor then used the legacy test OAuth application to grant them the Office 365 Exchange Online full_access_as_app role" What matters in this statement is not the particular app role that was granted. What matters is that this statement is saying the originally compromised service principal had the ability to grant app roles at all. Service principals can only do this by making POST requests to the appRoleAssignedTo MS Graph API endpoint. That action implies that the originally compromised service principal was either already a Global Admin, or had an Entra ID role or MS Graph app role that easily allows promotion of itself to Global Admin, as we detail in this blog post: posts.specterops.io/azure-privilege-escalation-via-azure-api-permissions-abuse-74aee1006f48 So, to finally answer the question: Blocking users from consenting to foreign applications would not have stopped the attack path, because at this point in the path, the adversary already had full control of the entire tenant. They could have simply toggled that setting off, or promoted the new user they created to an admin role that allows that user to consent to foreign apps even if the toggle is set to on.

  • @vedhex
    @vedhex 5 місяців тому

    Awesome explanation.

  • @jenquistable
    @jenquistable 5 місяців тому

    Great session, thanks for uploading it.

    • @robbinsandy
      @robbinsandy 4 місяці тому

      It's our pleasure. Thank you for watching the video

  • @minnuamir
    @minnuamir 5 місяців тому

    Amazing video! Always love to hear from Andy :)

  • @Crystalduck1
    @Crystalduck1 6 місяців тому

    So con deez nutz

  • @fabiorj2008
    @fabiorj2008 6 місяців тому

    please share slide.

    • @specterops
      @specterops 6 місяців тому

      You can view the slides at: ghst.ly/48KrccT

  • @freeload101
    @freeload101 6 місяців тому

    Bloodhound is pure terror evey time!

  • @mcacyber
    @mcacyber 6 місяців тому

    please share slide

    • @specterops
      @specterops 6 місяців тому

      You can view the slides at: ghst.ly/48KrccT

  • @sunny_disposition
    @sunny_disposition 6 місяців тому

    This is what makes being on the blue team fun. Red can develop some undetected tradecraft but once that is dropped in an exercise, the best blue teamers will expand that into coverage and tests for all the most generic detects possible over as many variations as nessecary. On Windows alone I’ve seen process injection and friends covered by 9 unique combinations of the related events. And tests for all of them. So while colbalt strike may be the most reliable red team approach for exercises, developing test coverage that can run in CI even remotely reliably is a separate challenge. These issues can often lead to frustration on the red side because blue (in my experience) always need more time than red teamers have the patience for.

  • @df4423
    @df4423 7 місяців тому

    Were you going to incorporate the prebuilt analysis paths into the CE version at some point?

    • @stephenhinck9204
      @stephenhinck9204 7 місяців тому

      Hi there, are you referring to the pre-built queries? If so, they are available under the Cypher box, then clicking the folder "Open" button on the left-hand side!

    • @df4423
      @df4423 7 місяців тому

      Thanks. Found them. @@stephenhinck9204

  • @shreyasd6794
    @shreyasd6794 7 місяців тому

    Thankyou

  • @darthmstrvader
    @darthmstrvader 8 місяців тому

    Best beard in the business

  • @pipi_delina
    @pipi_delina 8 місяців тому

    It's very interesting tool

  • @user-ye3pq6zv5z
    @user-ye3pq6zv5z 8 місяців тому

    Thanks for this. Just one question though, any options to convert data collected using old legacy Sharphound to the new bloodhound-ce supported format? I noticed that even if I ingest it the UI doesn't give me an error, but the data won't show (I presume the bloodhound-ce doesn't recognize the data collected using with legacy Sharphound). any possibility to make the older data work with CE?

    • @robbinsandy
      @robbinsandy 2 місяці тому

      Hi @user-ye3pq6zv5z, sorry for the delay in answering your question. Unfortunately with the major update from Legacy BloodHound to BloodHound Community Edition, we had to make breaking changes that mean data collected from older versions of SharpHound are not compatible with the latest BloodHound.

  • @dinlaurencebabia6578
    @dinlaurencebabia6578 8 місяців тому

    Can someone help? At 12:57, what does it mean if using FQDN to access something, it will break it?

    • @behindYOUR6
      @behindYOUR6 2 місяці тому

      FQDN to access something refers to specifying the complete domain name for a resource, including the hostname and the domain suffix (e.g., hostname.example.com) "break it" is related to LLMNR. ( look at the example how he got the NTLM hash. break it means in local networks for name resolution when the DNS resolution fails, typically due to DNS server unavailability or misconfiguration. then the LLMNR coming up to play. try to google how FQDN & LLMNR related to each other.

  • @sunny_disposition
    @sunny_disposition 9 місяців тому

    Problems I’ve run into as a detection engineer (blue): * red team NOT willing to share their best tradecraft * red team not understanding the challenge of designing detections that are precise enough to be viable * red team drops undetected kill chain and *mic drops*. “We win, gg”. And gets frustrated with the time it takes for blue to come up with a detection and ship / deploy it, analyze early results, deploy allowlisting, and arrive at a detect worth triaging. Some questions for others doing purps out there in the field: * are you purple teaming on your org’s actual network or a testing (and likely much simpler, less noisy) network? * what info / access are you giving red to start with and what is a successful kill chain? Do they get to drop and exec a file on the box or do they have to start with recon / enumerating the attack surface? * Is there a flag that red must exfil, or is the goal to achieve persistence inside the perim, or domain admin?

  • @Tathamet
    @Tathamet 10 місяців тому

    Thanks I did not know Shroud knows INFOSEC!

  • @bilmantender5812
    @bilmantender5812 10 місяців тому

    Every time SO drops a new tool I'm like: how do you guys consistently crank out such awesome stuff!!!!

  • @hauntedmound6358
    @hauntedmound6358 10 місяців тому

    I really like this.

  • @MarshallHallenbeck
    @MarshallHallenbeck 10 місяців тому

    This talk really helped me understand why this is useful, thanks for posting!

  • @wolfrevokcats7890
    @wolfrevokcats7890 10 місяців тому

    32:56 This is exactly what happened in HTB Forest. Members of the "Exchange Windows Permissions" group have WriteDacl on the domain. Glad that you explained this part. Suggestion, maybe you guys can do HTB (initial scanning can be skipped), probably not a walkthrough but to just explain the science behind it, how to do it right, and how to defend against this attack

  • @wolfrevokcats7890
    @wolfrevokcats7890 10 місяців тому

    0:29 ACH file is a fixed-width, ASCII file, with each line exactly 94 characters in length. May I know what so special about this? Thanks Andy and Will for all your great jobs

  • @Chris-zc9bp
    @Chris-zc9bp 11 місяців тому

    I came here to learn how to use merlin. Ended up learning much more. Very well presented and easy to understand. Never knew the difference between HTTP 1,2, and 3. That alone, for me, was very helpful and something I should have known long ago. Like they say, you don't know, what you don't know. Thank you

  • @neoninsv
    @neoninsv 11 місяців тому

    I guess my only complaint is that I will now have less time for coffee breaks betweeen queries lol. Awesome update!

  • @HAMETE
    @HAMETE 11 місяців тому

    Great work. This looks amazing. Congratulations to the team 👏

  • @CyberCelt.
    @CyberCelt. 11 місяців тому

    Really looking forward to this. I've a file of a few gigabytes from a university that was gonna take hours to import into the current bloodhound. Will try again with this one.

  • @wolfrevokcats7890
    @wolfrevokcats7890 11 місяців тому

    No audio for this? I click the link and it says that "This video isn't available any more" Anyway, you guys rocks! cc @harmj0y @SpecterOps

  • @linwoodeaton2907
    @linwoodeaton2907 Рік тому

    *Promosm*