posts.specterops.io
Open in
urlscan Pro
52.4.240.221
Public Scan
Submitted URL: http://posts.specterops.io/
Effective URL: https://posts.specterops.io/?gi=8d9c56baddbf
Submission: On February 28 via api from US — Scanned from DE
Effective URL: https://posts.specterops.io/?gi=8d9c56baddbf
Submission: On February 28 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy. Homepage Open in app Sign inGet started POSTS BY SPECTEROPS TEAM MEMBERS POSTS FROM SPECTEROPS TEAM MEMBERS ON VARIOUS TOPICS RELATING INFORMATION SECURITY BloodHoundOn DetectionAboutAll Postsspecterops.io FollowFollowing Latest Posts Garrett Foster Feb 21 -------------------------------------------------------------------------------- SCCM HIERARCHY TAKEOVER WITH HIGH AVAILABILITY TL;DR: SCCM sites configured to support high availability can be abused to… Read more… 72 Andy Robbins Feb 16 -------------------------------------------------------------------------------- THE MOST DANGEROUS ENTRA ROLE YOU’VE (PROBABLY) NEVER HEARD OF Read more… 125 Jonas Bülow Knudsen Feb 14 -------------------------------------------------------------------------------- ADCS ESC13 ABUSE TECHNIQUE It is possible to configure an Active Directory Certificate Services (ADCS) certificate template with an… Read more… 120 Andy Robbins Feb 12 -------------------------------------------------------------------------------- DIRECTORY.READWRITE.ALL IS NOT AS POWERFUL AS YOU MIGHT THINK Read more… 20 Cody Thomas Feb 7 -------------------------------------------------------------------------------- SPINNING WEBS — UNVEILING ARACHNE FOR WEB SHELL C2 WEB SHELL AGENT FOR MYTHIC C2 Read more… 12 Stephen Hinck Feb 2 -------------------------------------------------------------------------------- MICROSOFT BREACH — HOW CAN I SEE THIS IN BLOODHOUND? MAPPING ATTACK PATHS FROM FOREIGN PRINCIPALS IN… Read more… 140 2 responses Andy Robbins Feb 2 -------------------------------------------------------------------------------- MICROSOFT BREACH — WHAT HAPPENED? WHAT SHOULD AZURE ADMINS DO? Read more… 385 5 responses Posts By SpecterOps Team Members Posts from SpecterOps team members on various topics relating information security More information Followers 4.1K Elsewhere About Posts By SpecterOps Team MembersLatest StoriesArchiveAbout MediumTermsPrivacyTeams