Spencer Alessi's Avatar

Spencer Alessi

@bsky.ethicalthreat.com

- pentester/recovering sysadmin - Ethical Threat - Active Directory Security Connoisseur - offensive stuff > securit360.com - Host Cyber Threat POV > offsec.blog - SWAG > swag.ethicalthreat.com - free newsletter > https://click.spenceralessi.com/mylinks

3,666 Followers  |  109 Following  |  1,099 Posts  |  Joined: 09.11.2024  |  1.4974

Latest posts by bsky.ethicalthreat.com on Bluesky

Internal pentest findings that shouldn't exist in 2025...

- credentials on file shares/sharepoint/dms
- local admin password reuse
- kerberoastable domain admins
- ADCS Misconfigs
- spooler running on DCs
- lack of powershell restrictions
- EDR missing on hosts

11.07.2025 14:16 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Phishing in reverse, nice! You’re so right πŸ™ŒπŸ’ͺ

09.07.2025 10:38 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

EDR is great… but it can't go everywhere...

It can’t be disguised as private messages in Slack
It can’t plant documents in Teams
It can’t be installed on ICS

Deception can go where traditional endpoint security cannot...

08.07.2025 13:13 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

So much of researching & troubleshooting is just being patient enough to read long answers on reddit and stack overflow or I guess now days a bunch of AI responses...and being able to detect the bs and wade through it to find the "truth" or the answer or whatever the heck it is you're trying to do

07.07.2025 18:40 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

In cybersecurity and in life...

07.07.2025 14:07 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Learning how to research and self-educate in the IT/cybersecurity fields, heck in life, is such a super critical skill to develop...

04.07.2025 19:14 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

It’s really fun to pentest without malware. But it gets to be less fun when cool stuff that’s closed source gets detected more regularly, like ADExplorer.

This is a format petition to Microsoft to open source it. Pretty please with a cherry on top

04.07.2025 14:16 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

The value of understanding how permissions work in Active Directory cannot be understated. Out of all the common findings on internal pentests, of ad environments, that seems to be the # 1 most difficult for admins to identify on their own

03.07.2025 19:53 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

β€œGetting caught” is the start of great dialog between the pentester and the IT/Security team…

03.07.2025 13:34 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

One of the reasons to teach users how to spot malicious emails, links, texts, etc. is so they begin to pick up on the patterns threat actors use

Security awareness training helps users better perceive the risks of such techniques

02.07.2025 19:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

One of the reasons I really like deception tech is because if done well it can be used to identify the permission level and logical location of a threat actor

That’s not always the case for other security tools

02.07.2025 14:13 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Video Conferencing, Web Conferencing, Webinars, Screen Sharing Zoom is the leader in modern enterprise video communications, with an easy, reliable cloud platform for video and audio conferencing, chat, and webinars across mobile, desktop, and room systems. Zoom…

p.s. if you want to check out the recording of the deception webinar I did, details below

us06web.zoom.us/rec/share/Eb...
Passcode: Ct5sFdX!

01.07.2025 20:23 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Video Conferencing, Web Conferencing, Webinars, Screen Sharing Zoom is the leader in modern enterprise video communications, with an easy, reliable cloud platform for video and audio conferencing, chat, and webinars across mobile, desktop, and room systems. Zoom…

2) because you can put deception places where traditional security tools cannot currently go: slack, file shares, ticketing systems, sharepoint, github, aws, entra, etc.

01.07.2025 20:23 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

more alerts != better threat detection

i'm a big fan of deception for a couple reasons:

1) because of the quality of the alerts

01.07.2025 20:23 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Security hardening is the removal of dangerous configurations…

Security hardening is often seen as adding layers of controls, however, it’s more similar to taking away or locking down things that could be misused by attackers… while still making sure everything works the way it’s supposed to.

01.07.2025 13:13 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

It’s kind of a cliche saying but… β€œsuccess leaves clues” (taken from tony robbins) can be applied to cybersecurity success too..

30.06.2025 18:40 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Learning to recognize patterns is a super power in cybersecurity. How you do that? Not really sure to be honest. But I know you need reps to even have a chance…

30.06.2025 14:07 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Including the name of a tool in screenshots that show up in reports is one of those little nuance things that is actually really important. Barring private tooling, it's pure value add

27.06.2025 14:16 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Just blocking <companyname> and all the derivatives you can possibly think of (including slogans and nicknames) would prevent like 70% of all the weak passwords people use...

26.06.2025 19:53 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Another thing to block in terms of weak passwords is: <nameofservice> where the service is some kind of software that a majority of people use. Such as litigation software, document management systems, etc. Look at the most commonly used 3rd party software and block password derivatives using those

26.06.2025 13:34 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Lolol trigger warning

25.06.2025 22:47 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I honestly don't think you need to take ntds.dit offline and try and crack it to be sure users are using strong passwords. I think a better way is to use tools like Lithnet AD Password Protection or Specops to enforce strong policies...

25.06.2025 19:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Thanks so much for the support on the webinar today everyone! We crushed that, super fun, thanks for reminiscing with me while we watched those home alone clips πŸ˜‚πŸ˜‚

25.06.2025 17:17 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Welcome! You are invited to join a webinar: Spencer Alessi-Deceptively Defensive: What Kevin McCallister Can Teach us About Cyber Defense. After registering, you will receive a confirmation email about joining the webinar. What do paint cans, micro machines, and a fake holiday party have to do with catching cyber attackers? More than you think. Remember how Home Alone's Kevin McCallister turned his house into a…

WE ARE LIVE! Come hang out or register for the recording πŸ™
us06web.zoom.us/webinar/regi...

25.06.2025 15:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Welcome! You are invited to join a webinar: Spencer Alessi-Deceptively Defensive: What Kevin McCallister Can Teach us About Cyber Defense. After registering, you will receive a confirmation email about joining the webinar. What do paint cans, micro machines, and a fake holiday party have to do with catching cyber attackers? More than you think. Remember how Home Alone's Kevin McCallister turned his house into a…

πŸ”΄We're going live in 50 minutes, see you there!!

us06web.zoom.us/webinar/regi...

25.06.2025 15:10 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

All passwords can be cracked if, **checks notes** the password is the username....

25.06.2025 14:12 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Welcome! You are invited to join a webinar: Spencer Alessi-Deceptively Defensive: What Kevin McCallister Can Teach us About Cyber Defense. After registering, you will receive a confirmation email about joining the webinar. What do paint cans, micro machines, and a fake holiday party have to do with catching cyber attackers? More than you think. Remember how Home Alone's Kevin McCallister turned his house into a…

I get it...some cybersecurity initiatives can be hard to quantify the value of. For those on the fence or that need more data to support it...

I'll do my best to provide my thoughts on the ROI of deception and what it means in terms of defensive security spending.

us06web.zoom.us/webinar/regi...

25.06.2025 13:38 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
a man in a suit is sitting in a chair with his hand on his chin and the words trendizisst on the bottom right ALT: a man in a suit is sitting in a chair with his hand on his chin and the words trendizisst on the bottom right
24.06.2025 23:34 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

πŸ˜‚πŸ˜‚

24.06.2025 23:34 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I hate to be the bearer of bad news but your user's passwords are not as strong as you think they are...

24.06.2025 20:23 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0

@bsky.ethicalthreat.com is following 18 prominent accounts