werdhaihai 's Avatar

werdhaihai

@werdhaihai.bsky.social

Adversary Simulation Consultant @SpecterOps https://github.com/werdhaihai

50 Followers  |  84 Following  |  9 Posts  |  Joined: 31.07.2023  |  1.6347

Latest posts by werdhaihai.bsky.social on Bluesky

Preview
DCOM Again: Installing Trouble - SpecterOps DCOM lateral movement BOF using Windows Installer (MSI) Custom Action Server - install ODBC drivers to load and execute DLLs

Lateral movement getting blocked by traditional methods?

@werdhaihai.bsky.social just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG

29.09.2025 19:00 β€” πŸ‘ 9    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
Entra Connect Attacker Tradecraft: PartΒ 3 - SpecterOps How Entra Connect and Intune can be abused via userCertificate hijacking to bypass conditional access and compromise hybrid domains

Finally putting out my research from this spring. "Imitune" coming in soon to support the POC
specterops.io/blog/2025/07...

30.07.2025 16:46 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Entra Connect Attacker Tradecraft: PartΒ 3 - SpecterOps How Entra Connect and Intune can be abused via userCertificate hijacking to bypass conditional access and compromise hybrid domains

Entra Connect sync accounts can be exploited to hijack device userCertificate properties, enabling device impersonation and conditional access bypass.

@hotnops.bsky.social explores cross-domain compromise tradecraft within the same tenant.

Read more: ghst.ly/3ISMGN9

30.07.2025 17:01 β€” πŸ‘ 9    πŸ” 6    πŸ’¬ 1    πŸ“Œ 0
Preview
Good Fences Make Good Neighbors: New AD Trusts Attack Paths in BloodHound - SpecterOps The ability of an attacker controlling one domain to compromise another through an Active Directory (AD) trust depends on the trust type and configuration. To better map these relationships and make i...

I publish two blog posts today! πŸ“πŸ«

First dives into how we're improving the way BloodHound models attack paths through AD trusts: specterops.io/blog/2025/06...

Second covers an attack technique I came across while exploring AD trust abuse: specterops.io/blog/2025/06...

Hope you enjoy the read πŸ₯³

25.06.2025 10:14 β€” πŸ‘ 18    πŸ” 11    πŸ’¬ 0    πŸ“Œ 1
Post image

Think NTLM relay is a solved problem? Think again.

Relay attacks are more complicated than many people realize. Check out this deep dive from Elad Shamir on NTLM relay attacks & the new edges we recently added to BloodHound. ghst.ly/4lv3E31

08.04.2025 23:00 β€” πŸ‘ 27    πŸ” 20    πŸ’¬ 1    πŸ“Œ 2
Preview
An Operator’s Guide to Device-Joined Hosts and the PRT Cookie Introduction

Nothing new, but formalized some operator notes on Entra ID/Azure tradecraft I've found to be exceptionally useful on ops. Overlooked this myself for quite some time and thought others in the same boat might find it worth a read! πŸ“–

medium.com/specter-ops-...

07.04.2025 16:34 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

Super excited to be speaking at SO‑CON 2025 on March 31st with my coworker Lance Cain. We’re diving into an example attack path from real-life red team assessments by Lance Cain, Dan Mayer, myself, and the entire @specterops.bsky.social crew. specterops.io/so-con/ #SOCON2025 #redteam

22.03.2025 17:38 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
a man with a surprised look on his face is standing in front of the word awesome ALT: a man with a surprised look on his face is standing in front of the word awesome

The Mythic family continues to grow! Another cool Windows agent written in C that already has COFF execution! Be sure to check it out and their blog series on it c0rnbread.com/creating-myt...
x.com/0xC0rnbread/...

12.03.2025 13:35 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
Decrypting the Forest From the Trees - SpecterOps TL;DR: SCCM forest discovery accounts can be decrypted including accounts used for managing untrusted forests. If the site server is a managed client, service account credentials can be decrypted via ...

#SCCM forest discovery accounts can be decryptedβ€”even those for untrusted forests. If the site server is a managed client, all creds can be decrypted via Administration Service API.

Check out our latest blog post from @unsignedsh0rt.bsky.social to learn more. ghst.ly/4buoISp

06.03.2025 20:34 β€” πŸ‘ 22    πŸ” 15    πŸ’¬ 1    πŸ“Œ 0
Post image

BIG NEWS: SpecterOps raises $75M Series B to strengthen identity security! Led by Insight Partners with Ansa Capital, M12, Ballistic Ventures, Decibel, and Cisco Investments. ghst.ly/seriesb

#IdentitySecurity #CyberSecurity

(1/6)

05.03.2025 17:33 β€” πŸ‘ 16    πŸ” 9    πŸ’¬ 1    πŸ“Œ 1
Preview
dwight schrute from the office is holding a business card in his hand . ALT: dwight schrute from the office is holding a business card in his hand .

Many in the Mythic Community have asked for a way to standardize BOF/.NET execution within Mythic Agents. Today I'm releasing Forge, a new Mythic container to do just that: posts.specterops.io/forging-a-be...
We're starting off with default support for Apollo and Athena. Check it out! :)

05.02.2025 15:10 β€” πŸ‘ 11    πŸ” 4    πŸ’¬ 0    πŸ“Œ 1

I have done this 🀦

31.01.2025 02:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Entra Connect Attacker Tradecraft: Part 2 Now that we know how to add credentials to an on-premises user, lets pose a question:

This post goes more into Entra Connect tradecraft and how partially synced objects can be hijacked for cross domain attacks.
posts.specterops.io/entra-connec...

22.01.2025 17:43 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Life at SpecterOps Part II: From Dream to Reality We’re hiring consultants; Check out this overview of our recruiting process!

What does the road to becoming a Specter look like? In his latest blog post, @subat0mik.bsky.social provides a high level overview of how we approach recruiting consultants, demystifying the process along the way from application review through interviews. ghst.ly/3PQeuSh

21.01.2025 17:47 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
On the Applicability of the Timeroasting Attack Lately I’ve had an opportunity to experiment with the Timeroasting on an engagement, so here are my thoughts on the applicability of the attack in real life conditions with some examples along the way...

snovvcrash.rocks/2024/12/08/a...

08.12.2024 17:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Aight, who dcsyn'd today?

23.11.2024 05:42 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Following my prev tweet, my Kerberos MITM relay/forwarder is almost finished! It targets for example insecure DNS updates in AD, allowing DNS name forgery. It intercepts, relays, and forwards traffic, with the client unaware. Currently supporting smb->smb and smb->http (adcs)

20.11.2024 11:21 β€” πŸ‘ 36    πŸ” 14    πŸ’¬ 1    πŸ“Œ 0
Post image 16.11.2024 03:18 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Was doing some digging "What's New" in Server2025 learn.microsoft.com/en-us/window... specifically the changes to pre-2k machines. Oddvar and I had spoken previously about the changes being solid and demonstrated pre-created machines in ADUC could no longer be set with a default password.

15.11.2024 05:25 β€” πŸ‘ 10    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0
SO-CON 2025 Call for Presenters Closes November 15

SO-CON 2025 Call for Presenters Closes November 15

The CFP for #SOCON2025 closes TOMORROW!
We are accepting talks focused on identity-based security and Attack Paths. Submit yours today!

➑️ ghst.ly/cfp-socon25

14.11.2024 22:33 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

top notch engineering

13.11.2024 20:23 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - 0xthirteen/Carseat: Python implementation of GhostPack's Seatbelt situational awareness tool Python implementation of GhostPack's Seatbelt situational awareness tool - 0xthirteen/Carseat

Python implementation of some remote modules from Seatbelt by @0xthirteen

github.com/0xthirteen/C...

12.11.2024 21:08 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - 0xHossam/KernelCallbackTable-Injection-PoC: Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijack executio... Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijack execution flow - 0xHossam/KernelCallbackTable-Injection-PoC

README for this is great

github.com/0xHossam/Ker...

12.11.2024 04:56 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Anyone read Cory Doctorow's Red Team Blues yet? Curious to hear thoughts and opinions on it.

07.11.2024 16:05 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@werdhaihai is following 20 prominent accounts