JimSycurity Profile Banner
Jim Sykora Profile
Jim Sykora

@JimSycurity

Followers
3K
Following
206K
Media
2K
Statuses
19K

I enjoy security, technology, learning, books, & the great outdoors. Trying to be human & kind. Opinions = mine. He/Him/Hän

Minnesota, USA
Joined May 2019
Don't wanna be here? Send us removal request.
@JimSycurity
Jim Sykora
1 year
Ope. Updated my profile to a custom domain. https://t.co/VNAQDJj5lK
0
0
0
@SpecterOps
SpecterOps
2 days
BloodHound OpenGraph isn’t just about AD anymore. In his latest Risky Biz interview, @jaredcatkinson breaks down how OpenGraph now maps attack paths across GitHub, AWS, SaaS, CI/CD, and beyond, allowing defenders to see what attackers see. 🎧: https://t.co/RrzPKgQmJD
2
7
27
@merill
Merill Fernando
4 days
I'm so happy to see @NathanMcNulty voted the Security Super Star of the year and winning the Clippys at @wpninjasus So very well deserved Nathan! @m0bilej0n Folks, let's make this the @NathanMcNulty gratitude thread. Let him know how awesome he is in the replies.
49
13
194
@unsigned_sh0rt
Garrett
4 days
Blogs are up!
@SpecterOps
SpecterOps
4 days
Wanting more from today's #BHEU talk on SCOM? Check out this two part blog series! 1️⃣ @unsigned_sh0rt maps SCOM’s roles, accounts, & trust boundaries, then shows how attackers can chain insecure defaults into full management group compromise. https://t.co/Ai4TqTtc4O 🧵: 1/2
1
41
127
@SpecterOps
SpecterOps
4 days
Wanting more from today's #BHEU talk on SCOM? Check out this two part blog series! 1️⃣ @unsigned_sh0rt maps SCOM’s roles, accounts, & trust boundaries, then shows how attackers can chain insecure defaults into full management group compromise. https://t.co/Ai4TqTtc4O 🧵: 1/2
Tweet card summary image
specterops.io
TL:DR; SCOM suffers from similar insecure default configurations as its SCCM counterpart, enabling attackers to escalate privileges, harvest credentials, and ultimately compromise the entire manage...
1
47
116
@sekurlsa_pw
🕳
6 days
bloodhound-cli from @SpecterOps is a sort of companion helper tool for BloodHound to perform actions like updating, starting, checking logs and config, resetting the admin password etc. https://t.co/qCFjXyp0Gd (binaries available)
0
10
31
@SpecterOps
SpecterOps
13 days
Stack spoofing isn’t dead. Hear from @klezvirus at #BHEU on how modern detection still breaks, and unveils the first CET-compliant stack spoofing framework. Learn more ➡️ https://t.co/3ffbujgNPE
2
21
44
@SpecterOps
SpecterOps
11 days
SCOM monitors critical systems, but insecure defaults make it a powerful attack vector. At #BHEU, @unsigned_sh0rt & @breakfix show how to abuse SCOM for credential theft, lateral movement, and domain escalation, plus how to defend it. https://t.co/bxW5PYyhyl
0
31
70
@unsigned_sh0rt
Garrett
11 days
See you all next week...excited to present with @breakfix at #BHEU! 💣
@SpecterOps
SpecterOps
11 days
SCOM monitors critical systems, but insecure defaults make it a powerful attack vector. At #BHEU, @unsigned_sh0rt & @breakfix show how to abuse SCOM for credential theft, lateral movement, and domain escalation, plus how to defend it. https://t.co/bxW5PYyhyl
3
39
134
@RedSiege
Red Siege Information Security
26 days
Wake up, it's Wednesday! Join us for today's Wednesday Offensive with @JimSycurity discussing AdminSDHolder! See you at 130pm ET 🔗 https://t.co/HgPkoGT5M7 If you can't make it (or even if you can) be sure to check out Jim's whitepaper on AdminSDHolder 🔗 https://t.co/hRz5qrc2Pd
2
1
7
@SpecterOps
SpecterOps
26 days
Don't miss @JimSycurity TOMORROW on The Wednesday Offensive as he discusses his new e-Book, "AdminSDHolder Misconceptions and Misconfigurations." Read the e-Book ➡️
Tweet card summary image
specterops.io
AdminSDHolder is an object and associated process in Active Directory Domain Services (AD DS) that helps protect specific sensitive and highly privileged accounts from being manipulated. This topic...
@RedSiege
Red Siege Information Security
27 days
🔔 Friendly neighborhood reminder 🔔 Tomorrow on The Wednesday Offensive we have @JimSycurity talkin about AdminSDHolder! Join the conversation at 130pm ET 🔗 https://t.co/HgPkoGTDBF #hacking #infosec #cybersecurity
0
2
19
@RedSiege
Red Siege Information Security
27 days
🔔 Friendly neighborhood reminder 🔔 Tomorrow on The Wednesday Offensive we have @JimSycurity talkin about AdminSDHolder! Join the conversation at 130pm ET 🔗 https://t.co/HgPkoGTDBF #hacking #infosec #cybersecurity
0
2
4
@JimSycurity
Jim Sykora
1 month
See ya next week on the Wednesday Offensive!
@RedSiege
Red Siege Information Security
1 month
Great discussion today about unique methods for exfiltration using Microsoft services! Next week we have @JimSycurity discussing AdminSDHolder See you next Wednesday at 130pm ET 🔗 https://t.co/HgPkoGTDBF #hacking #infosec #cybersecurity
1
0
3
@DC612
Defcon 612
1 month
November 13th meeting details are up! Join us to hear Meander's talk "Back to Basics: Why we get it wrong, and how to get it right" Details below: https://t.co/wfxwZPq99E
0
2
3
@0xr0BIT
r0BIT
1 month
This is (probably) the last time I‘ll nag you with TaskHound. Since my org doesn’t allow me to use memes in our official blogs I finally took the hint and stopped procrastinating. My personal Blog is now live :). https://t.co/Sp2aj2Y0EO (Disclaimer: may contain sarcasm and memes)
2
20
84
@SpecterOps
SpecterOps
1 month
The Azure AD Broker plays a key role in Entra ID sign-in & token handling, but how well do we really understand it? @winternl_t unpacks its on-disk cache, how to decode it, & the security implications. 🔐
Tweet card summary image
specterops.io
This post documents the AAD Broker's storage format, how to unpack it, and discusses potential security implications.
1
34
104
@JimSycurity
Jim Sykora
1 month
AdminSDHolder is kinda my jam. I wrote the e-book on it. If you work with Activity Directory, I highly recommend you give this a skim, or at least check the spoilers in the blog.
@SpecterOps
SpecterOps
1 month
AdminSDHolder: the AD security feature everyone thinks they understand but probably don't. 😬 @JimSycurity went to the source code to debunk decades of misconceptions — including ones in Microsoft's own docs. Read more ⤵️ https://t.co/Vo9XksEfmn
2
34
195
@BSidesCharm
BSidesCharm
2 months
Got an idea for a @BSidesCharm 2026 Village? Submit it to our CFV - opening on Fri, 10/31 @ 2000 - keep this link handy - https://t.co/ZMd0fDAsM2
0
3
3
@podalirius_
Rémi GASCOU (Podalirius)
2 months
I have released an OpenGraph collector for network shares and my first blogpost at @SpecterOps on the subject! You can now visualize attack paths to network shares in BloodHound 👀 https://t.co/2e2DBIndcU
Tweet card summary image
specterops.io
ShareHound is an OpenGraph collector for BloodHound CE and BloodHound Enterprise helping identify attack paths to network shares automatically.
3
94
225
@_Mayyhem
Chris Thompson
5 months
I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it! - https://t.co/Hh089SaVOS - https://t.co/geO0HXTykf
6
215
632