
Matt Nelson
@enigma0x3
@specterops | Enjoys abusing features | github.com/enigma0x3
ID: 239952356
http://enigma0x3.net/ 18-01-2011 20:35:19
5,5K Tweet
32,32K Followers
368 Following

BloodHound Enterprise is now FedRAMP High Authorized! This achievement makes our identity security platform available to U.S. government orgs operating at the FedRAMP High baseline. Check out this blog post from our CEO David McGuire for more. ghst.ly/bhe-fedramp-hi…






What does the road to becoming a Specter look like? In his latest blog post, Duane Michael provides a high level overview of how we approach recruiting consultants, demystifying the process along the way from application review through interviews. ghst.ly/3PQeuSh

Introducing Forge 🔥 – the first “Command Augmentation” container for Mythic! Check out Cody Thomas's latest blog post to learn how this new add-on offers a more standardized way of executing BOFs and .NET assemblies. ghst.ly/416iKnu





BIG NEWS: SpecterOps raises $75M Series B to strengthen identity security! Led by @InsightPartners with @AnsaCapital, M12 - Microsoft's Venture Fund, Ballistic Ventures, Decibel, and Cisco Investments. ghst.ly/seriesb #IdentitySecurity #CyberSecurity (1/6)



Accurately see what permissions are exploitable in your AD environment. Chris Thompson discusses a recent update in BloodHound that shows fewer false positives for Owns/WriteOwner edges, & introduces the new Owns/WriteOwnerLimitedRights edges. ⬇️ ghst.ly/3QORQdF

New blog post just dropped! 🙌 Read the latest from Matt Creel on how an operator can perform situational awareness steps prior to making an Entra ID token request and how tokens can be effectively used once obtained. ghst.ly/4lA5Iqu

Think NTLM relay is a solved problem? Think again. Relay attacks are more complicated than many people realize. Check out this deep dive from Elad Shamir on NTLM relay attacks & the new edges we recently added to BloodHound. ghst.ly/4lv3E31

We are BACK with another #BloodHoundBasics post, this week courtesy of Andy Robbins. ICYMI: The BloodHound BACK button is BACK. Just use your browser's BACK button to go BACK. 🔙


I'm super happy to announce an operationally weaponized version of Yuval Gordon's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…

BadSuccessor is a new AD attack primitive that abuses dMSAs, allowing an attacker who can modify or create a dMSA to escalate privileges and take over the forest. Check out Jim Sykora's latest blog post to understand how you can mitigate risk. ghst.ly/4kXTLd9