
Joshua Prager
@praga_prag
“The impediment to action advances action. What stands in the way becomes the way.” - Marcus Aurelius
@SpecterOps
ID: 818868941477056514
https://medium.com/@bouj33boy 10-01-2017 17:15:44
1,1K Tweet
873 Takipçi
629 Takip Edilen



Introducing Stifle! A super simple .NET tool I spun up these past few days for abusing explicit strong certificate mappings leading to impersonation in Active Directory! Based off the research and powershell tools by Jonas Bülow Knudsen and SpecterOps last year. github.com/logangoins/Sti…



Join Joshua Prager for his talk at #SOCON2025 discussing the Misconfiguration Manager project attack techniques for both an offensive & defensive audience. Josh will also cover detection & evasion techniques in an "IDOT Red Vs Blue" style. Register today ▶️ ghst.ly/socon-tw



Think NTLM relay is a solved problem? Think again. Relay attacks are more complicated than many people realize. Check out this deep dive from Elad Shamir on NTLM relay attacks & the new edges we recently added to BloodHound. ghst.ly/4lv3E31



Understanding Windows access tokens could be your best defense. At CackalackyCon, Max Andreacchi will be peeling back the layers on potato exploits that threat actors use for privilege escalation. Check out the schedule to learn more ➡️ ghst.ly/4jzjlnI


I jumped heavily into learning about SCCM tradecraft and wrote a detailed write-up with custom examples, covering the most interesting vulnerabilities that combine commonality and impact from low-privilege contexts, and what you can do to prevent them :) logan-goins.com/2025-04-25-scc…

Don't let threat actors mash your Windows security! Max Andreacchi's CackalackyCon talk breaks down potato exploits from token mechanics to defensive implementations. Learn more ➡️ ghst.ly/4jzjlnI


Took Akamai Security Intelligence Group's script for BadSuccessor and improved it a bit. - runs from non domain joined systems - works in forests - prints the rights each entity has on a OU - pre-flight check if 2025 DCs are present - code changes here and there github.com/LuemmelSec/Pen…


I'm super happy to announce an operationally weaponized version of Yuval Gordon's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…

Extended on Logan Goins work for BadProcessor Fully native PowerShell Domain joined or not doesn't matter Check DCs Check ACLs Nice gridview Create weaponized dmsa The tool now helps in detectin / mitigation and attacking github.com/LuemmelSec/Pen…


BadSuccessor is a new AD attack primitive that abuses dMSAs, allowing an attacker who can modify or create a dMSA to escalate privileges and take over the forest. Check out Jim Sykora's latest blog post to understand how you can mitigate risk. ghst.ly/4kXTLd9



If you're planning to attend #BSidesSATX, plan to attend Joshua Prager's talk! He will share detection guidance, attack telemetry analysis, & defensive strategies to catch configuration manager abuse before it's too late. Learn more 👉 ghst.ly/43DALJK
