Elad Shamir Profile
Elad Shamir

@elad_shamir

Followers
5K
Following
327
Media
4
Statuses
112

Texas
Joined July 2017
Don't wanna be here? Send us removal request.
@elad_shamir
Elad Shamir
7 years
Check out my latest research "Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory". New attack techniques and live 0days inside. MSRC’s response: "this is not an issue which will be addressed via a security update".
Tweet card summary image
shenaniganslabs.io
Back in March 2018, I embarked on an arguably pointless crusade to prove that the TrustedToAuthForDelegation attribute was meaningless, and that “protocol transition” can be achieved without it. I...
17
346
597
@elad_shamir
Elad Shamir
4 days
RT @0xthirteen: I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it .
Tweet card summary image
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
55
0
@grok
Grok
4 days
Join millions who have switched to Grok.
179
202
2K
@elad_shamir
Elad Shamir
4 days
RT @SpecterOps: Hosts running the WebClient service are prime targets for NTLM relay attacks, and it may be possible to start the service r….
Tweet card summary image
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
58
0
@elad_shamir
Elad Shamir
9 days
RT @SpecterOps: The DSInternals PowerShell module just got an upgrade! 🔥. Updates include:.✅ Golden dMSA Attack.✅ Full LAPS support.✅ Trust….
Tweet card summary image
specterops.io
Discover the latest enhancements to the DSInternals PowerShell module, including the Golden dMSA Attack and support for LAPS, trust passwords, or BitLocker recovery keys.
0
40
0
@elad_shamir
Elad Shamir
9 days
RT @SpecterOps: We are breaking down our State of Attack Path Management report. Join @jaredcatkinson, @AndrewChiles, & @elad_shamir as th….
0
6
0
@elad_shamir
Elad Shamir
12 days
RT @SpecterOps: The AD CS security landscape keeps evolving, and so does our tooling. 🛠️. @bytewreck drops info on Certify 2.0, including a….
Tweet card summary image
specterops.io
Certify 2.0 features a suite of new capabilities and usability enhancements. This blogpost introduces changes and features additions.
0
97
0
@elad_shamir
Elad Shamir
24 days
RT @SpecterOps: Entra Connect sync accounts can be exploited to hijack device userCertificate properties, enabling device impersonation and….
Tweet card summary image
specterops.io
How Entra Connect and Intune can be abused via userCertificate hijacking to bypass conditional access and compromise hybrid domains
0
59
0
@elad_shamir
Elad Shamir
3 months
RT @_logangoins: I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum o….
Tweet card summary image
github.com
SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai. - logangoins/SharpSuccessor
0
170
0
@elad_shamir
Elad Shamir
5 months
NTLM relay is still a major threat and is now even easier to abuse. We just added new NTLM relay edges to BloodHound to help defenders fix and attackers think in graphs. Read my detailed post - the most comprehensive guide on NTLM relay & the new edges:.
Tweet card summary image
specterops.io
NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive and kicking and...
6
110
259
@elad_shamir
Elad Shamir
5 months
RT @SpecterOps: Think NTLM relay is a solved problem? Think again. Relay attacks are more complicated than many people realize. Check out….
Tweet card summary image
specterops.io
NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive and kicking and...
0
94
0
@elad_shamir
Elad Shamir
11 months
RT @__mez0__: Attended this remotely for Identity-Driven Offensive Tradecraft from @elad_shamir. 10/10 course, the @SpecterOps team had ins….
0
4
0
@elad_shamir
Elad Shamir
11 months
RT @SpecterOps: The CFP for #SOCON2025 is now open! 🙌. If you have an idea for a talk delving into the complexities of identifying, executi….
0
14
0
@elad_shamir
Elad Shamir
11 months
RT @_Mayyhem: If you liked RTO from @SpecterOps or have attack/defense experience, check out the continuation, Identity-driven Offensive Tr….
0
7
0
@elad_shamir
Elad Shamir
1 year
RT @SpecterOps: New blog post just dropped! 😎. In this installment of our blog series on Identity-Driven Offensive Tradecraft, @elad_shamir….
0
60
0
@elad_shamir
Elad Shamir
1 year
RT @jaredcatkinson: Yesterday, I wrote a thread describing the ESXi vulnerability and how you can use BloodHound's Attack Path Management a….
0
13
0
@elad_shamir
Elad Shamir
1 year
Check out my latest blog post, "The Security Principle Every Attacker Needs to Follow", in which I lay the foundation for a framework for discovering attack paths, including those that BloodHound can't find yet.
5
37
101
@elad_shamir
Elad Shamir
1 year
RT @SpecterOps: Kicking this week off with a new blog post from @elad_shamir introducing our new Identity-Driven Offensive Tradecraft train….
0
21
0
@elad_shamir
Elad Shamir
1 year
RT @jaredcatkinson: My On Detection series continues. In part 14 I look at a “special” subset of operations that require a bit more detail….
0
23
0
@elad_shamir
Elad Shamir
1 year
RT @harmj0y: It's a big day- @tifkin_, @0xdab0, and I are proud to announce that Nemesis 1.0.0 has landed! We have a ton of awesome new fea….
Tweet card summary image
github.com
An offensive data enrichment pipeline. Contribute to SpecterOps/Nemesis development by creating an account on GitHub.
0
62
0