Wait, Why is my WebClient Started?: SCCM Hierarchy Takeover via NTLM Relay to LDAP - SpecterOps
During automatic client push installation, an SCCM site server automatically attempts to map WebDav shares on clients, starting WebClient when installed.
SCCM client push strikes again for hierarchy takeover!
@logangoins.bsky.social just dropped a new blog showing how WebClient doesn't need to be already running on site servers to coerce HTTP (WebDav) auth & enable NTLM relay to LDAP for SCCM takeover
Read more: ghst.ly/3Z9Gbu6
14.01.2026 21:38 β π 5 π 3 π¬ 0 π 0
Catching Credential Guard Off Guard - SpecterOps
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
Credential Guard was supposed to end credential dumping. It didn't.
Valdemar CarΓΈe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled.
Read for more: ghst.ly/4qtl2rm
23.10.2025 17:45 β π 17 π 10 π¬ 0 π 0
Operating Outside the Box: NTLM Relaying Low-Privilege HTTP Auth to LDAP - SpecterOps
TL;DR When operating out of a ceded access or phishing payload with no credential material, you can use low-privilege HTTP authentication from the current user context to perform a proxied relay to LD...
Trying to fly under EDR's radar?
@logangoins.bsky.social explains how to use HTTP-to-LDAP relay attacks to execute tooling completely off-host through the C2 payload context. Perfect for when you need LDAP access but want to avoid being caught stealing creds. ghst.ly/41mjMv7
22.08.2025 18:24 β π 5 π 2 π¬ 0 π 0
Specializing in pen testing, red teaming, and Active SOC. We share our knowledge through blogs, webcasts, open-source tools, and Backdoors & Breaches game.
blackhillsinfosec.com & poweredbybhis.com
Hacker at outsidersecurity.nl. Researches Entra ID, AD and occasionally Windows security. I write open source security tools and do blogs/talks to educate others on these topics. Blog: dirkjanm.io
Penetration Testing, Purple Team, Red Team & Adversary Emulation.
Let our Offense, Prepare your Defense. https://redsiege.com
#weareoffensive
End-to-end Cybersecurity consulting team leading the industry, supporting organizations, and giving back. #HackThePlanet
https://trustedsec.com/
CEO @specterops.bsky.social
Senior Security Researcher at SpecterOps. All opinions are my own.
Associate Consultant @SpecterOps
Adversary Simulation
Active Directory | Web Apps | Social Engineering | Physical Security
Adversary Simulation Consultant @SpecterOps
https://github.com/werdhaihai
Long time dumpster fire connoisseur.
Minnesota Stan.
MN and IN CCDC Red Team Lead.
Associate AdSim Consultant at SpecterOps.
Opinions are my own, not of any other entity.
AdSim Consultant @ SpecterOps π»
Corgi dad πΆ
Cat servant π±
Tattoo collector πΌοΈ
Runner ππ»
Adversary Simulation | Wannabe
https://twitter.com/tw1sm
https://blog.tw1sm.io
Father / Husband / COO at SpecterOps
I like making computers misbehave. Does stuff at http://specterops.io.
Github: https://github.com/leechristensen
Mastodon: @tifkin_@infosec.exchange
@its_a_feature_ on Twitter | Mythic developer | @SpecterOps
Hacker for hire at @specterops.bsky.social
Blog: https://blog.xpnsec.com