SpecterOps
SpecterOps
  • 168
  • 275 658
Using Apeman to Discover Attack Paths in AWS
In this webinar, Daniel Heinsen showcases how Apeman can quickly identify Attack Paths by solving AWS CTF challenges. In solving these challenges, he covers:
- Resource permission evaluation
- Identity Transformations
- Resultant Set of Policy
Each CTF challenge addressed highlights a common misconfiguration and how Apeman can help identify them.
มุมมอง: 250

วีดีโอ

BloodHound Enterprise - A Quick Tour
มุมมอง 5352 หลายเดือนก่อน
Concerned about lateral movement and escalations in your directory environments? Watch this quick demo of BloodHound Enterprise, the go-to platform for Attack Path Management. BloodHound Enterprise empowers identity and security teams with continuous prioritization, remediation guidance and verification, and reporting metrics to reduce identity risk and show improvements over time. Beloved by h...
Attackers Follow Security Principles Too
มุมมอง 3322 หลายเดือนก่อน
It's a common misconception that only defenders need to follow security principles. However, attackers can equally benefit from understanding and applying these concepts. The Clean Source Principle, one of the most crucial yet often overlooked security principles, is a prime example. In fact, it's arguable that all Attack Paths can be traced back to a violation of this principle. Our new traini...
Synced User Attack Path Analysis with BloodHound
มุมมอง 9393 หลายเดือนก่อน
BloodHound Enterprise and BloodHound CE now support hybrid Attack Paths that go from on-prem Active Directory to Entra, and vice versa. The first class of hybrid Attack Paths our products support are those that rely on users that are synchronized from on-prem Active Directory to Entra. In this webinar we discuss discovery, execution, and remediation of those Attack Paths. We explain two new edg...
Introduction to Attack Path Management
มุมมอง 5163 หลายเดือนก่อน
Curious about Attack Path Management? In this video, we’ll break down the basics of how to spot, assess, and manage potential attack paths in your network. Whether you're new to the concept or looking to sharpen your skills, this intro will help you better protect your organization by staying a step ahead of attackers.
Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover
มุมมอง 4894 หลายเดือนก่อน
Conducting NTLM relays from command-and-control (C2) infrastructure involves several hurdles for red teamers and penetration testers to overcome, in contrast to being directly plugged into a target network. When relaying inbound SMB traffic on a compromised Windows machine, a major tradecraft consideration is how an attacker will control or manipulate the inbound traffic. A problem arises due t...
To Infinity and Beyond: Building Purple Team Test Cases
มุมมอง 5265 หลายเดือนก่อน
This webinar explores SpecterOps' approach to Purple Teaming. The presenters examine the intricacies of evaluating security controls in the context of User Hunting, a popular attack technique used to discover where high-value users are logged in throughout the network to target their identity. They cover many common mistakes defenders make in designing, testing, and evaluating detection strateg...
Demo: Attack Path Management, the BloodHound Enterprise Way (June 25, 2024)
มุมมอง 4675 หลายเดือนก่อน
In this webinar, Sergio Gonzalez breaks down the key concepts around Active Directory Attack Path Management. Through this interactive walkthrough he covers why you should care about Attack Paths and how BloodHound approaches identification and elimination. Sergio discusses how security teams can operationalize continuous Attack Path mapping, measuring impact, and prioritizing mitigation effort...
Ghosts on the Node - Will Pearce & Nick Landers [SO-CON 2024]
มุมมอง 7565 หลายเดือนก่อน
2023 was a breakthrough year for all things Machine Learning, especially for generative use cases. The community saw models and frameworks released at a blistering pace thanks to innovative solutions to fit LLMs onto smaller and smaller devices (LoRA, PEFT, etc). The industry saw the rise of risk assessment frameworks and legislative actions, leading to new requirements for organizations to fol...
Building Our Nemesis
มุมมอง 6876 หลายเดือนก่อน
This webinar delves into the recent release of Nemesis 1.0, our offensive-focused data enrichment pipeline years in the making. Nemesis aims to unify all post-exploitation data from offensive engagements in order to improve operator workflows, provide tradecraft assistance, and uncover new data-driven research opportunities. The presenters cover various red team challenges that influenced Nemes...
No Cert? No Problem - ClickOnce (Ab)Use for Trusted Code Execution
มุมมอง 5346 หลายเดือนก่อน
No Cert? No Problem - ClickOnce (Ab)Use for Trusted Code Execution
Analyzing and Executing ADCS Attack Paths with BloodHound- Andy Robbins & Jonas Knudsen[SO-CON 2024]
มุมมอง 4636 หลายเดือนก่อน
Analyzing and Executing ADCS Attack Paths with BloodHound- Andy Robbins & Jonas Knudsen[SO-CON 2024]
KubeHound and Beyond: Evolving Security Through Graphs & Automation - Jeremy Fox [SO-CON 2024]
มุมมอง 4156 หลายเดือนก่อน
KubeHound and Beyond: Evolving Security Through Graphs & Automation - Jeremy Fox [SO-CON 2024]
Misconfiguration Manager: Overlooked and Overprivileged- Duane Michael & Chris Thompson[SO-CON 2024]
มุมมอง 5806 หลายเดือนก่อน
Misconfiguration Manager: Overlooked and Overprivileged- Duane Michael & Chris Thompson[SO-CON 2024]
The BloodHound Enterprise State of Attack Path Management - Justin Kohler [SO-CON 2024]
มุมมอง 3466 หลายเดือนก่อน
The BloodHound Enterprise State of Attack Path Management - Justin Kohler [SO-CON 2024]
Beyond the Shell: Unconventional Agents for Red Teaming Success - Cody Thomas [SO-CON 2024]
มุมมอง 1.3K6 หลายเดือนก่อน
Beyond the Shell: Unconventional Agents for Red Teaming Success - Cody Thomas [SO-CON 2024]
Manually Enumerating AD Attack Paths with BOFHound - Matt Creel & Adam Brown [SO-CON 2024]
มุมมอง 5106 หลายเดือนก่อน
Manually Enumerating AD Attack Paths with BOFHound - Matt Creel & Adam Brown [SO-CON 2024]
Identity Providers for Red Teamers - Adam Chester [SO-CON 2024]
มุมมอง 2.7K6 หลายเดือนก่อน
Identity Providers for Red Teamers - Adam Chester [SO-CON 2024]
Attack Path Based Detection Engineering: Leveraging BloodHound for Ro... -Olaf Hartong [SO-CON 2024]
มุมมอง 1.6K6 หลายเดือนก่อน
Attack Path Based Detection Engineering: Leveraging BloodHound for Ro... -Olaf Hartong [SO-CON 2024]
Graphs are Hard - John Hopper & Rohan Vazarkar [SO-CON 2024]
มุมมอง 3016 หลายเดือนก่อน
Graphs are Hard - John Hopper & Rohan Vazarkar [SO-CON 2024]
LSA Whisperer - Evan McBroom [SO-CON 2024]
มุมมอง 3646 หลายเดือนก่อน
LSA Whisperer - Evan McBroom [SO-CON 2024]
The Dog Ate My Homework... (re)Building a PowerShell module for the... - JD Douillard [SO-CON 2024]
มุมมอง 2636 หลายเดือนก่อน
The Dog Ate My Homework... (re)Building a PowerShell module for the... - JD Douillard [SO-CON 2024]
Domain Persistence: Detection, Triage, and Recovery - Josh Prager & Nico Shyne [SO-CON 2024]
มุมมอง 7436 หลายเดือนก่อน
Domain Persistence: Detection, Triage, and Recovery - Josh Prager & Nico Shyne [SO-CON 2024]
2023 SANS SOC Survey Review: Highlights and Deep Dive - Christopher Crowley [SO-CON 2024]
มุมมอง 2026 หลายเดือนก่อน
2023 SANS SOC Survey Review: Highlights and Deep Dive - Christopher Crowley [SO-CON 2024]
Project Apeman: Mapping AWS Identity Attack Paths - Daniel Heinsen [SO-CON 2024]
มุมมอง 7756 หลายเดือนก่อน
Project Apeman: Mapping AWS Identity Attack Paths - Daniel Heinsen [SO-CON 2024]
The New SaaS Cyber Kill Chain - Luke Jennings [SO-CON 2024]
มุมมอง 5916 หลายเดือนก่อน
The New SaaS Cyber Kill Chain - Luke Jennings [SO-CON 2024]
Attack Path Management, the BloodHound Enterprise Way (May 23, 2024)
มุมมอง 3556 หลายเดือนก่อน
Attack Path Management, the BloodHound Enterprise Way (May 23, 2024)
BloodHound Update: Spring 2024
มุมมอง 3007 หลายเดือนก่อน
BloodHound Update: Spring 2024
Auditing Kerberoastable Accounts
มุมมอง 3627 หลายเดือนก่อน
Auditing Kerberoastable Accounts
Attack Path Management, the BloodHound Enterprise Way
มุมมอง 6507 หลายเดือนก่อน
Attack Path Management, the BloodHound Enterprise Way

ความคิดเห็น

  • @acceshopping7360
    @acceshopping7360 16 วันที่ผ่านมา

    i have this error Gracefully stopping... (press Ctrl+C again to force) Error response from daemon: Ports are not available: exposing port TCP 127.0.0.1:8 080 -> 0.0.0.0:0: listen tcp 127.0.0.1:8080: bind: An attempt was made to access a socket in a way forbidden by its access permissions.

  • @token1111
    @token1111 หลายเดือนก่อน

    Top tier stuff.

  • @ttutankhamon86
    @ttutankhamon86 2 หลายเดือนก่อน

    28:42 was not expecting to see a reference to Zeno's Paradox, specifically the "Dichotomy Paradox", in a purple team video :)

  • @LucasKatashit
    @LucasKatashit 2 หลายเดือนก่อน

    shroud, king of reddit, is now AD red teamer. What a legend!

  • @cali-oq5kj
    @cali-oq5kj 2 หลายเดือนก่อน

    wow!

  • @nightwing09x
    @nightwing09x 2 หลายเดือนก่อน

    dumb vid, thats how the tech works

  • @50PullUps
    @50PullUps 2 หลายเดือนก่อน

    That’s not unique to password hash synchronization.

  • @CU.SpaceCowboy
    @CU.SpaceCowboy 2 หลายเดือนก่อน

    the mythic c2 command prompt is really neat how you can minimize or expand the output with the toggle button. I don't know why cobalt strike doesn't have that (it might for new versions im thinking of 4.5)

  • @williamm3555
    @williamm3555 3 หลายเดือนก่อน

    I've been meaning to get a better understanding of this, and low and behold SpectorOps appears in my feed 😁

  • @Offensive-Patti
    @Offensive-Patti 3 หลายเดือนก่อน

    It's an asymptote @ 28:35

  • @SrRunsis
    @SrRunsis 5 หลายเดือนก่อน

    Awesome talk! There should be a 2024 version now

  • @AsdZxc-sj9sd
    @AsdZxc-sj9sd 6 หลายเดือนก่อน

    Wow amazing

  • @JWieg
    @JWieg 6 หลายเดือนก่อน

    Thanks for posting. 🎉 very interesting

  • @anirbandas6257
    @anirbandas6257 6 หลายเดือนก่อน

    amazing work!

  • @JWieg
    @JWieg 6 หลายเดือนก่อน

    Great talk. Thank you. 🎉

  • @djhohnstein
    @djhohnstein 6 หลายเดือนก่อน

    first.

  • @jerryxie777
    @jerryxie777 8 หลายเดือนก่อน

    So you really don't think anyone can totally understand kerberos will watch your video😂😅😊

  • @computerb0y27
    @computerb0y27 8 หลายเดือนก่อน

    still relevant and good!

  • @Dandelionq
    @Dandelionq 8 หลายเดือนก่อน

    Answer me people cos im stuck

  • @Dandelionq
    @Dandelionq 8 หลายเดือนก่อน

    It didnt generate password

    • @Dandelionq
      @Dandelionq 8 หลายเดือนก่อน

      What im supposed to do

  • @somnathdeb4109
    @somnathdeb4109 8 หลายเดือนก่อน

    Everything is fine..also kindly tell us to remove this whole neo4j server from our system?

  • @eointhomas2914
    @eointhomas2914 9 หลายเดือนก่อน

    Really enjoyed this vid, I manage some Azure Tenants and all cloud providers are a whole discipline in themselves, so much to look over and keep an eye on

  • @devkaushik9618
    @devkaushik9618 9 หลายเดือนก่อน

    Learned a lot! Thanks

  • @z0mn1a
    @z0mn1a 10 หลายเดือนก่อน

    Make content losers.

  • @prisccaviana
    @prisccaviana 10 หลายเดือนก่อน

    Man...I had a blast! thank you so much for your brilliant explanation Andy! keep coming!

    • @robbinsandy
      @robbinsandy 9 หลายเดือนก่อน

      It's my pleasure, thank you for watching. I hope the information was useful.

  • @ashr_
    @ashr_ 10 หลายเดือนก่อน

    Best OS C2 in 2024. Thank you Cody and SpecterOps.

  • @erilycus
    @erilycus 10 หลายเดือนก่อน

    Great stuff, got useful for personal project

  • @faanross
    @faanross 10 หลายเดือนก่อน

    oh man this is pure gold thanks!!

  • @JWieg
    @JWieg 10 หลายเดือนก่อน

    thanks guys. very very comprehensive overview

    • @robbinsandy
      @robbinsandy 9 หลายเดือนก่อน

      It's our pleasure, thank you for watching

  • @DaveAitel
    @DaveAitel 10 หลายเดือนก่อน

    Having an AUDIENCE for this video that asks questions and clarifies things is GREAT.

    • @robbinsandy
      @robbinsandy 9 หลายเดือนก่อน

      Thank you for that feedback, Dave, and thank you for watching our video

  • @DaveAitel
    @DaveAitel 10 หลายเดือนก่อน

    For next video would appreciate it for us old ppl that you have a SLIGHTLY BIGGER terminal font :)

    • @robbinsandy
      @robbinsandy 9 หลายเดือนก่อน

      Thank you for that note, Dave, I will make sure terminals are easily legible the next time we make a video

  • @UnicTools-d6g
    @UnicTools-d6g 10 หลายเดือนก่อน

    Great Stuff. Do you have a discord link or Telegram?

    • @specterops
      @specterops 10 หลายเดือนก่อน

      We are not on Discord or Telegram. You can follow us on: X: twitter.com/SpecterOps LinkedIn: www.linkedin.com/company/specterops Mastodon: infosec.exchange/@SpecterOps You can also join the conversation on our BloodHound Gang Slack channel at ghst.ly/BHSlack

  • @josephtillman8639
    @josephtillman8639 11 หลายเดือนก่อน

    Can you elaborate on what you said at 30:55, that disabling user consent would not have prevented SVR from granting consent to the malicious OAuth applications?

    • @robbinsandy
      @robbinsandy 11 หลายเดือนก่อน

      This is regarding the attack path step that Microsoft describes as: "They created a new user account to grant consent in the Microsoft corporate environment to the actor controlled malicious OAuth applications." This is a great question because it may seem as if disabling users' ability to consent to foreign applications would have stopped the attack path in its tracks. But the very next statement Microsoft makes is this: "The threat actor then used the legacy test OAuth application to grant them the Office 365 Exchange Online full_access_as_app role" What matters in this statement is not the particular app role that was granted. What matters is that this statement is saying the originally compromised service principal had the ability to grant app roles at all. Service principals can only do this by making POST requests to the appRoleAssignedTo MS Graph API endpoint. That action implies that the originally compromised service principal was either already a Global Admin, or had an Entra ID role or MS Graph app role that easily allows promotion of itself to Global Admin, as we detail in this blog post: posts.specterops.io/azure-privilege-escalation-via-azure-api-permissions-abuse-74aee1006f48 So, to finally answer the question: Blocking users from consenting to foreign applications would not have stopped the attack path, because at this point in the path, the adversary already had full control of the entire tenant. They could have simply toggled that setting off, or promoted the new user they created to an admin role that allows that user to consent to foreign apps even if the toggle is set to on.

  • @vedsec
    @vedsec 11 หลายเดือนก่อน

    Awesome explanation.

    • @robbinsandy
      @robbinsandy 9 หลายเดือนก่อน

      Thank you

  • @jenquistable
    @jenquistable 11 หลายเดือนก่อน

    Great session, thanks for uploading it.

    • @robbinsandy
      @robbinsandy 9 หลายเดือนก่อน

      It's our pleasure. Thank you for watching the video

  • @minnuamir
    @minnuamir 11 หลายเดือนก่อน

    Amazing video! Always love to hear from Andy :)

  • @Crystalduck1
    @Crystalduck1 ปีที่แล้ว

    So con deez nutz

  • @fabiorj2008
    @fabiorj2008 ปีที่แล้ว

    please share slide.

    • @specterops
      @specterops ปีที่แล้ว

      You can view the slides at: ghst.ly/48KrccT

  • @freeload101
    @freeload101 ปีที่แล้ว

    Bloodhound is pure terror evey time!

  • @cyberbro_security
    @cyberbro_security ปีที่แล้ว

    please share slide

    • @specterops
      @specterops ปีที่แล้ว

      You can view the slides at: ghst.ly/48KrccT

  • @sunny_disposition
    @sunny_disposition ปีที่แล้ว

    This is what makes being on the blue team fun. Red can develop some undetected tradecraft but once that is dropped in an exercise, the best blue teamers will expand that into coverage and tests for all the most generic detects possible over as many variations as nessecary. On Windows alone I’ve seen process injection and friends covered by 9 unique combinations of the related events. And tests for all of them. So while colbalt strike may be the most reliable red team approach for exercises, developing test coverage that can run in CI even remotely reliably is a separate challenge. These issues can often lead to frustration on the red side because blue (in my experience) always need more time than red teamers have the patience for.

  • @df4423
    @df4423 ปีที่แล้ว

    Were you going to incorporate the prebuilt analysis paths into the CE version at some point?

    • @stephenhinck9204
      @stephenhinck9204 ปีที่แล้ว

      Hi there, are you referring to the pre-built queries? If so, they are available under the Cypher box, then clicking the folder "Open" button on the left-hand side!

    • @df4423
      @df4423 ปีที่แล้ว

      Thanks. Found them. @@stephenhinck9204

  • @shreyasd6794
    @shreyasd6794 ปีที่แล้ว

    Thankyou

  • @darthmstrvader
    @darthmstrvader ปีที่แล้ว

    Best beard in the business

  • @pipi_delina
    @pipi_delina ปีที่แล้ว

    It's very interesting tool

  • @JohnSamuels-d4z
    @JohnSamuels-d4z ปีที่แล้ว

    Thanks for this. Just one question though, any options to convert data collected using old legacy Sharphound to the new bloodhound-ce supported format? I noticed that even if I ingest it the UI doesn't give me an error, but the data won't show (I presume the bloodhound-ce doesn't recognize the data collected using with legacy Sharphound). any possibility to make the older data work with CE?

    • @robbinsandy
      @robbinsandy 8 หลายเดือนก่อน

      Hi @user-ye3pq6zv5z, sorry for the delay in answering your question. Unfortunately with the major update from Legacy BloodHound to BloodHound Community Edition, we had to make breaking changes that mean data collected from older versions of SharpHound are not compatible with the latest BloodHound.

  • @dinlaurencebabia6578
    @dinlaurencebabia6578 ปีที่แล้ว

    Can someone help? At 12:57, what does it mean if using FQDN to access something, it will break it?

    • @behindYOUR6
      @behindYOUR6 8 หลายเดือนก่อน

      FQDN to access something refers to specifying the complete domain name for a resource, including the hostname and the domain suffix (e.g., hostname.example.com) "break it" is related to LLMNR. ( look at the example how he got the NTLM hash. break it means in local networks for name resolution when the DNS resolution fails, typically due to DNS server unavailability or misconfiguration. then the LLMNR coming up to play. try to google how FQDN & LLMNR related to each other.

  • @sunny_disposition
    @sunny_disposition ปีที่แล้ว

    Problems I’ve run into as a detection engineer (blue): * red team NOT willing to share their best tradecraft * red team not understanding the challenge of designing detections that are precise enough to be viable * red team drops undetected kill chain and *mic drops*. “We win, gg”. And gets frustrated with the time it takes for blue to come up with a detection and ship / deploy it, analyze early results, deploy allowlisting, and arrive at a detect worth triaging. Some questions for others doing purps out there in the field: * are you purple teaming on your org’s actual network or a testing (and likely much simpler, less noisy) network? * what info / access are you giving red to start with and what is a successful kill chain? Do they get to drop and exec a file on the box or do they have to start with recon / enumerating the attack surface? * Is there a flag that red must exfil, or is the goal to achieve persistence inside the perim, or domain admin?

  • @Tathamet
    @Tathamet ปีที่แล้ว

    Thanks I did not know Shroud knows INFOSEC!

    • @ajayghale2623
      @ajayghale2623 ปีที่แล้ว

      i swear i thot abt the same thing lol

    • @M4lch4t
      @M4lch4t ปีที่แล้ว

      lol

    • @awecwec3720
      @awecwec3720 10 หลายเดือนก่อน

      xdd

    • @_RaVeN33
      @_RaVeN33 9 หลายเดือนก่อน

      😂 spot on

    • @artywatts4892
      @artywatts4892 2 หลายเดือนก่อน

      lmao

  • @bilmantender5812
    @bilmantender5812 ปีที่แล้ว

    Every time SO drops a new tool I'm like: how do you guys consistently crank out such awesome stuff!!!!