Forrest Kasler (@fkasler) 's Twitter Profile
Forrest Kasler

@fkasler

Climber, Penetration Tester, Code Junkie, Malware Enthusiast @specterops

ID: 45474010

calendar_today08-06-2009 01:49:16

188 Tweet

512 Takipçi

390 Takip Edilen

Daniel Heinsen (@hotnops) 's Twitter Profile Photo

It's alive! Apeman is a graph-based tool to model AWS IAM permissions. This marks the start of a new journey to methodically identify and remediate IAM attack paths, and I look forward to learning together with y'all. github.com/hotnops/apeman

SpecterOps (@specterops) 's Twitter Profile Photo

Blending in is the key to staying 'stealthy' in network traffic. In this week's installment of the #Phishing School blog series, Forrest Kasler details how you can hide your C2 implant w/ stealthy callback channels. Read more ⤵️ ghst.ly/4ciTBrS

TrustedSec (@trustedsec) 's Twitter Profile Photo

You never know when some Windows legacy knowledge will help you succeed in an engagement. In our new #blog, Oddvar Moe reveals a new #phishing technique implemented by creating an empty file with the .udl extension. Read it now! hubs.la/Q02Lqb4s0

SpecterOps (@specterops) 's Twitter Profile Photo

New blog post just dropped! 😎 In this installment of our blog series on Identity-Driven Offensive Tradecraft, Elad Shamir shares a framework he developed for discovering known & unknown Attack Paths. posts.specterops.io/navigating-the…

Forrest Kasler (@fkasler) 's Twitter Profile Photo

This is the last of my phishing series! It's a recap and reference for the whole thing. Hope it was as fun to read as it was to write:

Duane Michael (@subat0mik) 's Twitter Profile Photo

I wrote a blog post about some of the intangible benefits of working as a red team operator and adversary simulation consultant at SpecterOps. It's pretty awesome here. And we're hiring! posts.specterops.io/life-at-specte…

SpecterOps (@specterops) 's Twitter Profile Photo

Ghostwriter 💜 Tool Integration! Ghostwriter v3.0.0 features a powerful GraphQL API, making tool integration a breeze. Alexander Sou's latest blog post showcases the API's capabilities using our Operation Log Generator. Learn more ⤵️ghst.ly/4dCohWE

Duane Michael (@subat0mik) 's Twitter Profile Photo

I just merged a new credential technique into Misconfiguration Manager, thanks to Alberto! Check it out: github.com/subat0mik/Misc…

SpecterOps (@specterops) 's Twitter Profile Photo

How did attendees enjoy the talks at #SOCON2024? Hear their thoughts! ⤵️ The CFP for #SOCON2025 is open & we are looking for talks digging into the complexities of identifying, executing, & protecting against modern Attack Paths. Submit by November 15: ghst.ly/cfp-socon25

SpecterOps (@specterops) 's Twitter Profile Photo

Our Sales team is hiring Account Executives in the Eastern and Central US regions to support the BloodHound Enterprise team. Check out the roles & apply today! Eastern US ➡️ ghst.ly/4dzgY14 Central US ➡️ ghst.ly/3NhMjdH

Our Sales team is hiring Account Executives in the Eastern and Central US regions to support the BloodHound Enterprise team. Check out the roles & apply today!

Eastern US ➡️ ghst.ly/4dzgY14
Central US ➡️ ghst.ly/3NhMjdH
Adam Chester 🏴‍☠️ (@_xpn_) 's Twitter Profile Photo

This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range. volexity.com/blog/2024/11/2… And yet... they got caught doing this!

This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring  companies and finding a dual-homed host within range.

volexity.com/blog/2024/11/2…

And yet... they got caught doing this!
Simon Lermen (@simonlermenai) 's Twitter Profile Photo

I and Fred Heiding published a human study on AI spear phishing: We use AI agents built from GPT-4o and Claude 3.5 Sonnet to search the web for available information on a target and use this for highly personalized phishing messages. achieved click-through rates above 50%

I and <a href="/fredheiding/">Fred Heiding</a> published a human study on AI spear phishing:
We use AI agents built from GPT-4o and Claude 3.5 Sonnet to search the  web for available information on a target and use this for highly  personalized phishing messages. achieved click-through rates above 50%
Atsika (@_atsika) 's Twitter Profile Photo

If you thought phishing was now ineffective, you may have missed something 👀 My latest post highlights the advanced tactics used to bypass security controls and deceive even the most savvy users. Check it out ⤵️

Binni Shah (@binitamshah) 's Twitter Profile Photo

cuddlephish : Weaponized multi-user browser-in-the-middle (BitM) for penetration testers : github.com/fkasler/cuddle… Details : link.springer.com/article/10.100… credits Forrest Kasler

cuddlephish : Weaponized multi-user browser-in-the-middle (BitM) for penetration testers : github.com/fkasler/cuddle… 

Details : link.springer.com/article/10.100…  credits <a href="/FKasler/">Forrest Kasler</a>
SpecterOps (@specterops) 's Twitter Profile Photo

Wondering how you can maintain persistence while staying under the radar? Antero Guy just dropped his guide on COM hijacking — a go-to technique that balances stealth w/ reliability. Read more ⤵️ ghst.ly/4kg5Ytq

mr.d0x (@mrd0x) 's Twitter Profile Photo

Finally had some time to publish these blogs. Enjoy! Spying On Screen Activity Using Chromium Browsers mrd0x.com/spying-with-ch… Camera and Microphone Spying Using Chromium Browsers mrd0x.com/spying-with-ch…

SpecterOps (@specterops) 's Twitter Profile Photo

MSSQLHound leverages BloodHound's OpenGraph to visualize MSSQL attack paths with 7 new nodes & 37 new edges, all without touching the SharpHound & BloodHound codebases. Chris Thompson unpacks this new feature in his blog post. 👇 ghst.ly/4leRFFn