maeru's Avatar

maeru

@m8r1us.bsky.social

Offensive & Defensive Security Consultant | @scipag | #RedTeam | @m8r1us on most other platforms

40 Followers  |  116 Following  |  2 Posts  |  Joined: 22.11.2023
Posts Following

Posts by maeru (@m8r1us.bsky.social)

Preview
The (Near) Return of the King: Account Takeover Using the BadSuccessor Technique - SpecterOps After Microsoft patched Yuval Gordon’s BadSuccessor privilege escalation technique, BadSuccessor returned with another blog from Yuval, briefly mentioning to the community that attackers can still abu...

Patching one technique doesn't close the entire attack vector.

dMSA abuse is still a problem, and @logangoins.bsky.social
just dropped a reality check with new tooling to prove it.

Learn more about the issue & the new BadTakeover BOF. ghst.ly/42POg9L

20.10.2025 16:54 β€” πŸ‘ 3    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
PingOne Attack Paths - SpecterOps You can use PingOneHound in conjunction with BloodHound Community Edition to discover, analyze, execute, and remediate identity-based attack paths in PingOne instances.

Introducing PingOneHound! This OpenGraph extension for BloodHound can help you identify, analyze, execute, and remediate attack paths in PingOne organizations. Read the introductory blog post here: specterops.io/blog/2025/10...

20.10.2025 17:43 β€” πŸ‘ 9    πŸ” 10    πŸ’¬ 0    πŸ“Œ 0
Preview
Dough No! Revisiting Cookie Theft - SpecterOps Explore how cookie theft has evolved in Chromium browsers with the shift from DPAPI to App-Bound encryption. This post breaks down modern cookie stealing techniques via COM, remote debugging, and exte...

Cookie theft has evolved. πŸͺ

Over the last year, stealing cookies on Windows devices has changed significantly for Chromium browsers like Chrome and Edge. Andrew Gomez dives into these changes, how threat actors adapt, & new detection opportunities. ghst.ly/45S1ZgW

27.08.2025 16:55 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

Check out my new blog on nested app authentication.

13.08.2025 16:43 β€” πŸ‘ 6    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - olafhartong/BamboozlEDR: A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes. A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes. - olafhartong/BamboozlEDR

During my #BHUSA talk I've released many ETW research tools, of which the most notable is BamboozlEDR. This tool allows you to inject events into ETW, allowing you to generate fake alerts and blind EDRs.

github.com/olafhartong/...

Slides available here:
github.com/olafhartong/...

06.08.2025 20:49 β€” πŸ‘ 25    πŸ” 15    πŸ’¬ 0    πŸ“Œ 1
Post image

If you use CIS Benchmarks, I highly advise against this recommendation...

This disables cloud delivered protection which underpins a bunch of capabilities, disables roughly half of your protection

Fortunately, if you enable Tamper Protection, it is forcefully enabled for you :)

01.08.2025 20:12 β€” πŸ‘ 20    πŸ” 2    πŸ’¬ 2    πŸ“Œ 1
Post image

πŸš€πŸ”Ž Track Sensitive Graph API Calls with my new #KQL Function for #MicrosoftDefenderXDR

Microsoft has released the new advanced hunting table "GraphAPIAuditEvents" which offers great opportunities to investigate activities based on #MicrosoftGraph API calls.

17.07.2025 06:43 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Preview
Machine Learning Series Chapter 1 - SpecterOps This article explores core machine learning concepts through Micrograd, a minimal autograd engine. It covers regression, classification, loss functions, gradients, and backpropagation with examples. W...

Dive into the world of machine learning! βš™οΈ

Kicking off his blog series, Diego Lomellini uses Micrograd to explain core ML concepts like supervised learning, regression, classification, loss functions, & gradient descent. ghst.ly/44n3IeJ

02.07.2025 18:06 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Extracting Sensitive Information from Azure Load Testing Learn how Azure Load Testing's JMeter JMX and Locust support enables code execution, metadata queries, reverse shells, and Key Vault secret extraction vulnerabilities.

I have a new post out on the @netspi.bsky.social blog today. This one is on extracting sensitive information from the Azure Load Testing service. www.netspi.com/blog/technic...

01.07.2025 20:47 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 1    πŸ“Œ 1

Actually, it's very helpful to trigger a LPE on servers by placing the missing wlanapi.dll in a writable %path% location by a non-admin user ;)

28.06.2025 11:31 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - SpecterOps/Nemesis: An offensive data enrichment pipeline An offensive data enrichment pipeline. Contribute to SpecterOps/Nemesis development by creating an account on GitHub.

Happy Friday! @tifkin.bsky.social and I are happy to announce that we have cut the release for Nemesis 2.0.0 - check out the CHANGELOG for a (brief) summary of changes, and dive into our new docs for more detail! We're extremely proud and excited for this release github.com/SpecterOps/N...

28.06.2025 04:14 β€” πŸ‘ 12    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Preview
Good Fences Make Good Neighbors: New AD Trusts Attack Paths in BloodHound - SpecterOps The ability of an attacker controlling one domain to compromise another through an Active Directory (AD) trust depends on the trust type and configuration. To better map these relationships and make i...

How attackers move between AD domains via trusts depends on trust type & config. We're replacing TrustedBy edge in BloodHound with new trust edges for better attack path mapping.

Check out @jonas-bk.bsky.social's blog post to learn more. ghst.ly/4lj9C5T

25.06.2025 23:30 β€” πŸ‘ 8    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Preview
Misconfiguration Manager: Still Overlooked, Still Overprivileged - SpecterOps It has been one year since Misconfiguration Manager's release and SCCM misconfigurations remain widespread, leading to dangerous attack paths across enterprises. Here we summarize the impact and commu...

In the year since Misconfiguration Manager's release, the security community has been actively researching new tradecraft & identifying new attack paths.

@subat0mik.bsky.social & @unsignedsh0rt.bsky.social dive into the research & its impact on the state of SCCM security. Read more: ghst.ly/460vI9d

26.06.2025 15:52 β€” πŸ‘ 3    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Presentations and external blogs Dirk-jan’s personal blog, mostly containing research on topics I find interesting, such as (Azure) Active Directory internals, protocols and vulnerabilities.

Last two weeks I talked about BYO Identity Providers in Entra ID and backdoors to External Auth Methods to bypass MFA. Only possible because MSFT doesn't implement the mandatory OIDC security measures. Slides with optional dark mode on: dirkjanm.io/talks/

24.06.2025 07:12 β€” πŸ‘ 11    πŸ” 5    πŸ’¬ 1    πŸ“Œ 1
Preview
Administrator Protection Review - SpecterOps Microsoft will be introducing Administrator Protection into Windows 11. This post explores security considerations for red teamers.

Get the scoop on the incoming Administrator Protection for Windows 11.

@xpnsec.com covers the architecture, access controls, and why some legacy UAC bypass techniques remain effective in his latest blog post. ghst.ly/44mw5JM

18.06.2025 18:34 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 1

We are VERY excited to announce that Volatility 3 has now reached feature parity with Volatility 2! With this parity release, Volatility 2 is now deprecated. Full details in the blog post linked below.

16.05.2025 15:08 β€” πŸ‘ 20    πŸ” 11    πŸ’¬ 0    πŸ“Œ 0
Preview
Despite Recent Security Hardening, Entra ID Synchronization Feature Remains Open for Abuse Microsoft synchronization capabilities for managing identities in hybrid environments are not without their risks. In this blog, Tenable Research explores how potential weaknesses in these synchroniza...

Microsoft hardened the Entra ID synchronization feature last year:
- restricted permissions on Directory Synchronization Accounts role
- new dedicated sync app
Let’s find out how sync still works πŸ”
Some old tricks persistβ€”and new ones have emerged πŸ’₯
tenable.com/blog/despite... 🧡

24.04.2025 13:39 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 1    πŸ“Œ 1
Preview
Comprehensive Guide to Configuring Advanced Auditing This post provides everything you need to ensure Advanced Auditing is fully configured and auditing everything we possibly can for both existing and new users. I recently shared guidance for this via social media (see below), and it felt like a perfect time to revisit my previous posts and combine everything into one comprehensive guide :) You likely aren't collecting all available events to the Unified Audit Log First, not all events are enabled or retained optimally. Consider creating this policy in the Purview portal (leave users and record types blank to collect everything). Retention is based on license... pic.twitter.com/IEKKfrkpI8

Most Microsoft tenants do not have Advanced Auditing configured correctly, and orgs only find out after it is too late :(

I tried really hard to make this as short and simple as possible. Please be nice to your IR folks and set this up, it's important ;)

nathanmcnulty.com/bl...

16.04.2025 05:13 β€” πŸ‘ 34    πŸ” 10    πŸ’¬ 2    πŸ“Œ 0
Preview
Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking - Check Point Research Research by: hasherezade Key Points Introduction Process injection is one of theΒ important techniques used by attackers. We can find its variants implemented in almost every malware. It serves purpose...

My new blog for CPR: introducing Waiting Thread Hijacking - a remote process injection technique targeting waiting threads: research.checkpoint.com/2025/waiting... #ProcessInjection

14.04.2025 18:17 β€” πŸ‘ 15    πŸ” 10    πŸ’¬ 3    πŸ“Œ 0
Preview
The SQL Server Crypto Detour - SpecterOps As part of my role as Service Architect here at SpecterOps, one of the things I’m tasked with is exploring all kinds of technologies to help those on assessments with advancing their engagement. Not l...

Celebrating 1 year at SpecterOps, this was the first project I worked on after starting. Looking at SQL Server Transparent Data Encryption, how to bruteforce weak keys, and how ManageEngine's ADSelfService product uses TDE with a suspect key. Enjoy :) specterops.io/blog/2025/04...

08.04.2025 16:03 β€” πŸ‘ 15    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0
Post image

Think NTLM relay is a solved problem? Think again.

Relay attacks are more complicated than many people realize. Check out this deep dive from Elad Shamir on NTLM relay attacks & the new edges we recently added to BloodHound. ghst.ly/4lv3E31

08.04.2025 23:00 β€” πŸ‘ 27    πŸ” 20    πŸ’¬ 1    πŸ“Œ 2
Preview
GitHub - decoder-it/KrbRelayEx-RPC Contribute to decoder-it/KrbRelayEx-RPC development by creating an account on GitHub.

KrbRelayEx-RPC tool is out! πŸŽ‰
Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and relays the AP-REQ to access SMB shares or HTTP ADCS, all fully transparent to the victim ;)
github.com/decoder-it/K...

14.03.2025 10:18 β€” πŸ‘ 9    πŸ” 10    πŸ’¬ 0    πŸ“Œ 0
Preview
Decrypting the Forest From the Trees - SpecterOps TL;DR: SCCM forest discovery accounts can be decrypted including accounts used for managing untrusted forests. If the site server is a managed client, service account credentials can be decrypted via ...

#SCCM forest discovery accounts can be decryptedβ€”even those for untrusted forests. If the site server is a managed client, all creds can be decrypted via Administration Service API.

Check out our latest blog post from @unsignedsh0rt.bsky.social to learn more. ghst.ly/4buoISp

06.03.2025 20:34 β€” πŸ‘ 22    πŸ” 15    πŸ’¬ 1    πŸ“Œ 0
Preview
Don’t Touch That Object! Finding SACL Tripwires During Red Team Ops - SpecterOps During red team operations, stealth is a critical component. We spend a great deal of time ensuring our payloads will evade any endpoint detection and response (EDR) solution, our traffic is obfuscate...

How are defenders leveraging SACLs to detect unauthorized access attempts? Check out our latest blog post from Alexander DeMine which dives into SACLs and introduces a new tool, SACL_Scanner, which allows you to adapt your tradecraft accordingly. ghst.ly/3D3kvbD

20.02.2025 20:39 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Normally you can't auth to Entra ID connected webapps with bearer tokens. But if Teams can open SharePoint/OneDrive with an access token, I guess so can we. roadtx now supports opening SharePoint with access tokens in the embedded browser πŸ˜€

18.02.2025 13:12 β€” πŸ‘ 19    πŸ” 8    πŸ’¬ 1    πŸ“Œ 0

ROADtools update: I just released roadlib v1.0! This version drops the adal dependency, all auth flows are now implemented natively πŸŽ‰ This was mostly a personal goal, but it helps with adding new features, such as forcing MFA during device code auth independent of CA policies πŸ˜€

07.02.2025 14:50 β€” πŸ‘ 31    πŸ” 11    πŸ’¬ 2    πŸ“Œ 0
Windows Bug Class: Accessing Trapped COM Objects with IDispatch Posted by James Forshaw, Google Project Zero Object orientated remoting technologies such as DCOM and .NET Remoting make it very easy ...

New blog post on the abuse of the IDispatch COM interface to get unexpected objects loaded into a process. Demoed by using this to get arbitrary code execution in a PPL process. googleprojectzero.blogspot.com/2025/01/wind...

30.01.2025 18:37 β€” πŸ‘ 65    πŸ” 41    πŸ’¬ 2    πŸ“Œ 0
Preview
Abusing multicast poisoning for pre-authenticated Kerberos relay over HTTP with Responder and krbrelayx

In our latest article, @croco_byte proposes an implementation of a trick discovered by James Forshaw in his research regarding Kerberos relaying. Discover how to perform pre-authenticated Kerberos relay over HTTP with our Responder and krbrelayx pull requests!
www.synacktiv.com/publications...

27.01.2025 12:06 β€” πŸ‘ 16    πŸ” 12    πŸ’¬ 0    πŸ“Œ 1
Preview
Process Hollowing on Windows 11 24H2 Process Hollowing (a.k.a. RunPE) is probably the oldest, and the most popular process impersonation technique (it allows to run a malicious executable under the cover of a benign process). It is us…

In case if you wonder what broke #ProcessHollowing on Windows 11 24H2, I have something for you: hshrzd.wordpress.com/2025/01/27/p...

26.01.2025 23:55 β€” πŸ‘ 58    πŸ” 38    πŸ’¬ 0    πŸ“Œ 1